blob: aec6b0a6ca7b422422b8d528060a6d7a17d9167f [file] [log] [blame]
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16package android.net;
17
18import static android.annotation.SystemApi.Client.MODULE_LIBRARIES;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090019import static android.net.NetworkRequest.Type.BACKGROUND_REQUEST;
20import static android.net.NetworkRequest.Type.LISTEN;
21import static android.net.NetworkRequest.Type.REQUEST;
junyulai5a5c99b2021-03-05 15:51:17 +080022import static android.net.NetworkRequest.Type.TRACK_BEST;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090023import static android.net.NetworkRequest.Type.TRACK_DEFAULT;
Lorenzo Colittia77d05e2021-01-29 20:14:04 +090024import static android.net.NetworkRequest.Type.TRACK_SYSTEM_DEFAULT;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090025import static android.net.QosCallback.QosCallbackRegistrationException;
26
27import android.annotation.CallbackExecutor;
28import android.annotation.IntDef;
29import android.annotation.NonNull;
30import android.annotation.Nullable;
31import android.annotation.RequiresPermission;
32import android.annotation.SdkConstant;
33import android.annotation.SdkConstant.SdkConstantType;
34import android.annotation.SuppressLint;
35import android.annotation.SystemApi;
36import android.annotation.SystemService;
37import android.app.PendingIntent;
38import android.compat.annotation.UnsupportedAppUsage;
39import android.content.Context;
40import android.content.Intent;
41import android.net.IpSecManager.UdpEncapsulationSocket;
42import android.net.SocketKeepalive.Callback;
43import android.net.TetheringManager.StartTetheringCallback;
44import android.net.TetheringManager.TetheringEventCallback;
45import android.net.TetheringManager.TetheringRequest;
Roshan Piuse08bc182020-12-22 15:10:42 -080046import android.net.wifi.WifiNetworkSuggestion;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090047import android.os.Binder;
48import android.os.Build;
49import android.os.Build.VERSION_CODES;
50import android.os.Bundle;
51import android.os.Handler;
52import android.os.IBinder;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090053import android.os.Looper;
54import android.os.Message;
55import android.os.Messenger;
56import android.os.ParcelFileDescriptor;
57import android.os.PersistableBundle;
58import android.os.Process;
59import android.os.RemoteException;
60import android.os.ResultReceiver;
61import android.os.ServiceManager;
62import android.os.ServiceSpecificException;
63import android.provider.Settings;
64import android.telephony.SubscriptionManager;
65import android.telephony.TelephonyManager;
66import android.util.ArrayMap;
67import android.util.Log;
68import android.util.Range;
69import android.util.SparseIntArray;
70
71import com.android.connectivity.aidl.INetworkAgent;
72import com.android.internal.annotations.GuardedBy;
Remi NGUYEN VAN3f0e7dd2021-03-15 07:27:44 +000073import com.android.internal.util.Preconditions;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090074import com.android.internal.util.Protocol;
75
76import libcore.net.event.NetworkEventDispatcher;
77
78import java.io.IOException;
79import java.io.UncheckedIOException;
80import java.lang.annotation.Retention;
81import java.lang.annotation.RetentionPolicy;
82import java.net.DatagramSocket;
83import java.net.InetAddress;
84import java.net.InetSocketAddress;
85import java.net.Socket;
86import java.util.ArrayList;
87import java.util.Collection;
88import java.util.HashMap;
89import java.util.List;
90import java.util.Map;
91import java.util.Objects;
92import java.util.concurrent.Executor;
93import java.util.concurrent.ExecutorService;
94import java.util.concurrent.Executors;
95import java.util.concurrent.RejectedExecutionException;
96
97/**
98 * Class that answers queries about the state of network connectivity. It also
99 * notifies applications when network connectivity changes.
100 * <p>
101 * The primary responsibilities of this class are to:
102 * <ol>
103 * <li>Monitor network connections (Wi-Fi, GPRS, UMTS, etc.)</li>
104 * <li>Send broadcast intents when network connectivity changes</li>
105 * <li>Attempt to "fail over" to another network when connectivity to a network
106 * is lost</li>
107 * <li>Provide an API that allows applications to query the coarse-grained or fine-grained
108 * state of the available networks</li>
109 * <li>Provide an API that allows applications to request and select networks for their data
110 * traffic</li>
111 * </ol>
112 */
113@SystemService(Context.CONNECTIVITY_SERVICE)
114public class ConnectivityManager {
115 private static final String TAG = "ConnectivityManager";
116 private static final boolean DEBUG = Log.isLoggable(TAG, Log.DEBUG);
117
118 /**
119 * A change in network connectivity has occurred. A default connection has either
120 * been established or lost. The NetworkInfo for the affected network is
121 * sent as an extra; it should be consulted to see what kind of
122 * connectivity event occurred.
123 * <p/>
124 * Apps targeting Android 7.0 (API level 24) and higher do not receive this
125 * broadcast if they declare the broadcast receiver in their manifest. Apps
126 * will still receive broadcasts if they register their
127 * {@link android.content.BroadcastReceiver} with
128 * {@link android.content.Context#registerReceiver Context.registerReceiver()}
129 * and that context is still valid.
130 * <p/>
131 * If this is a connection that was the result of failing over from a
132 * disconnected network, then the FAILOVER_CONNECTION boolean extra is
133 * set to true.
134 * <p/>
135 * For a loss of connectivity, if the connectivity manager is attempting
136 * to connect (or has already connected) to another network, the
137 * NetworkInfo for the new network is also passed as an extra. This lets
138 * any receivers of the broadcast know that they should not necessarily
139 * tell the user that no data traffic will be possible. Instead, the
140 * receiver should expect another broadcast soon, indicating either that
141 * the failover attempt succeeded (and so there is still overall data
142 * connectivity), or that the failover attempt failed, meaning that all
143 * connectivity has been lost.
144 * <p/>
145 * For a disconnect event, the boolean extra EXTRA_NO_CONNECTIVITY
146 * is set to {@code true} if there are no connected networks at all.
147 *
148 * @deprecated apps should use the more versatile {@link #requestNetwork},
149 * {@link #registerNetworkCallback} or {@link #registerDefaultNetworkCallback}
150 * functions instead for faster and more detailed updates about the network
151 * changes they care about.
152 */
153 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
154 @Deprecated
155 public static final String CONNECTIVITY_ACTION = "android.net.conn.CONNECTIVITY_CHANGE";
156
157 /**
158 * The device has connected to a network that has presented a captive
159 * portal, which is blocking Internet connectivity. The user was presented
160 * with a notification that network sign in is required,
161 * and the user invoked the notification's action indicating they
162 * desire to sign in to the network. Apps handling this activity should
163 * facilitate signing in to the network. This action includes a
164 * {@link Network} typed extra called {@link #EXTRA_NETWORK} that represents
165 * the network presenting the captive portal; all communication with the
166 * captive portal must be done using this {@code Network} object.
167 * <p/>
168 * This activity includes a {@link CaptivePortal} extra named
169 * {@link #EXTRA_CAPTIVE_PORTAL} that can be used to indicate different
170 * outcomes of the captive portal sign in to the system:
171 * <ul>
172 * <li> When the app handling this action believes the user has signed in to
173 * the network and the captive portal has been dismissed, the app should
174 * call {@link CaptivePortal#reportCaptivePortalDismissed} so the system can
175 * reevaluate the network. If reevaluation finds the network no longer
176 * subject to a captive portal, the network may become the default active
177 * data network.</li>
178 * <li> When the app handling this action believes the user explicitly wants
179 * to ignore the captive portal and the network, the app should call
180 * {@link CaptivePortal#ignoreNetwork}. </li>
181 * </ul>
182 */
183 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
184 public static final String ACTION_CAPTIVE_PORTAL_SIGN_IN = "android.net.conn.CAPTIVE_PORTAL";
185
186 /**
187 * The lookup key for a {@link NetworkInfo} object. Retrieve with
188 * {@link android.content.Intent#getParcelableExtra(String)}.
189 *
190 * @deprecated The {@link NetworkInfo} object is deprecated, as many of its properties
191 * can't accurately represent modern network characteristics.
192 * Please obtain information about networks from the {@link NetworkCapabilities}
193 * or {@link LinkProperties} objects instead.
194 */
195 @Deprecated
196 public static final String EXTRA_NETWORK_INFO = "networkInfo";
197
198 /**
199 * Network type which triggered a {@link #CONNECTIVITY_ACTION} broadcast.
200 *
201 * @see android.content.Intent#getIntExtra(String, int)
202 * @deprecated The network type is not rich enough to represent the characteristics
203 * of modern networks. Please use {@link NetworkCapabilities} instead,
204 * in particular the transports.
205 */
206 @Deprecated
207 public static final String EXTRA_NETWORK_TYPE = "networkType";
208
209 /**
210 * The lookup key for a boolean that indicates whether a connect event
211 * is for a network to which the connectivity manager was failing over
212 * following a disconnect on another network.
213 * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
214 *
215 * @deprecated See {@link NetworkInfo}.
216 */
217 @Deprecated
218 public static final String EXTRA_IS_FAILOVER = "isFailover";
219 /**
220 * The lookup key for a {@link NetworkInfo} object. This is supplied when
221 * there is another network that it may be possible to connect to. Retrieve with
222 * {@link android.content.Intent#getParcelableExtra(String)}.
223 *
224 * @deprecated See {@link NetworkInfo}.
225 */
226 @Deprecated
227 public static final String EXTRA_OTHER_NETWORK_INFO = "otherNetwork";
228 /**
229 * The lookup key for a boolean that indicates whether there is a
230 * complete lack of connectivity, i.e., no network is available.
231 * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
232 */
233 public static final String EXTRA_NO_CONNECTIVITY = "noConnectivity";
234 /**
235 * The lookup key for a string that indicates why an attempt to connect
236 * to a network failed. The string has no particular structure. It is
237 * intended to be used in notifications presented to users. Retrieve
238 * it with {@link android.content.Intent#getStringExtra(String)}.
239 */
240 public static final String EXTRA_REASON = "reason";
241 /**
242 * The lookup key for a string that provides optionally supplied
243 * extra information about the network state. The information
244 * may be passed up from the lower networking layers, and its
245 * meaning may be specific to a particular network type. Retrieve
246 * it with {@link android.content.Intent#getStringExtra(String)}.
247 *
248 * @deprecated See {@link NetworkInfo#getExtraInfo()}.
249 */
250 @Deprecated
251 public static final String EXTRA_EXTRA_INFO = "extraInfo";
252 /**
253 * The lookup key for an int that provides information about
254 * our connection to the internet at large. 0 indicates no connection,
255 * 100 indicates a great connection. Retrieve it with
256 * {@link android.content.Intent#getIntExtra(String, int)}.
257 * {@hide}
258 */
259 public static final String EXTRA_INET_CONDITION = "inetCondition";
260 /**
261 * The lookup key for a {@link CaptivePortal} object included with the
262 * {@link #ACTION_CAPTIVE_PORTAL_SIGN_IN} intent. The {@code CaptivePortal}
263 * object can be used to either indicate to the system that the captive
264 * portal has been dismissed or that the user does not want to pursue
265 * signing in to captive portal. Retrieve it with
266 * {@link android.content.Intent#getParcelableExtra(String)}.
267 */
268 public static final String EXTRA_CAPTIVE_PORTAL = "android.net.extra.CAPTIVE_PORTAL";
269
270 /**
271 * Key for passing a URL to the captive portal login activity.
272 */
273 public static final String EXTRA_CAPTIVE_PORTAL_URL = "android.net.extra.CAPTIVE_PORTAL_URL";
274
275 /**
276 * Key for passing a {@link android.net.captiveportal.CaptivePortalProbeSpec} to the captive
277 * portal login activity.
278 * {@hide}
279 */
280 @SystemApi
281 public static final String EXTRA_CAPTIVE_PORTAL_PROBE_SPEC =
282 "android.net.extra.CAPTIVE_PORTAL_PROBE_SPEC";
283
284 /**
285 * Key for passing a user agent string to the captive portal login activity.
286 * {@hide}
287 */
288 @SystemApi
289 public static final String EXTRA_CAPTIVE_PORTAL_USER_AGENT =
290 "android.net.extra.CAPTIVE_PORTAL_USER_AGENT";
291
292 /**
293 * Broadcast action to indicate the change of data activity status
294 * (idle or active) on a network in a recent period.
295 * The network becomes active when data transmission is started, or
296 * idle if there is no data transmission for a period of time.
297 * {@hide}
298 */
299 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
300 public static final String ACTION_DATA_ACTIVITY_CHANGE =
301 "android.net.conn.DATA_ACTIVITY_CHANGE";
302 /**
303 * The lookup key for an enum that indicates the network device type on which this data activity
304 * change happens.
305 * {@hide}
306 */
307 public static final String EXTRA_DEVICE_TYPE = "deviceType";
308 /**
309 * The lookup key for a boolean that indicates the device is active or not. {@code true} means
310 * it is actively sending or receiving data and {@code false} means it is idle.
311 * {@hide}
312 */
313 public static final String EXTRA_IS_ACTIVE = "isActive";
314 /**
315 * The lookup key for a long that contains the timestamp (nanos) of the radio state change.
316 * {@hide}
317 */
318 public static final String EXTRA_REALTIME_NS = "tsNanos";
319
320 /**
321 * Broadcast Action: The setting for background data usage has changed
322 * values. Use {@link #getBackgroundDataSetting()} to get the current value.
323 * <p>
324 * If an application uses the network in the background, it should listen
325 * for this broadcast and stop using the background data if the value is
326 * {@code false}.
327 * <p>
328 *
329 * @deprecated As of {@link VERSION_CODES#ICE_CREAM_SANDWICH}, availability
330 * of background data depends on several combined factors, and
331 * this broadcast is no longer sent. Instead, when background
332 * data is unavailable, {@link #getActiveNetworkInfo()} will now
333 * appear disconnected. During first boot after a platform
334 * upgrade, this broadcast will be sent once if
335 * {@link #getBackgroundDataSetting()} was {@code false} before
336 * the upgrade.
337 */
338 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
339 @Deprecated
340 public static final String ACTION_BACKGROUND_DATA_SETTING_CHANGED =
341 "android.net.conn.BACKGROUND_DATA_SETTING_CHANGED";
342
343 /**
344 * Broadcast Action: The network connection may not be good
345 * uses {@code ConnectivityManager.EXTRA_INET_CONDITION} and
346 * {@code ConnectivityManager.EXTRA_NETWORK_INFO} to specify
347 * the network and it's condition.
348 * @hide
349 */
350 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
351 @UnsupportedAppUsage
352 public static final String INET_CONDITION_ACTION =
353 "android.net.conn.INET_CONDITION_ACTION";
354
355 /**
356 * Broadcast Action: A tetherable connection has come or gone.
357 * Uses {@code ConnectivityManager.EXTRA_AVAILABLE_TETHER},
358 * {@code ConnectivityManager.EXTRA_ACTIVE_LOCAL_ONLY},
359 * {@code ConnectivityManager.EXTRA_ACTIVE_TETHER}, and
360 * {@code ConnectivityManager.EXTRA_ERRORED_TETHER} to indicate
361 * the current state of tethering. Each include a list of
362 * interface names in that state (may be empty).
363 * @hide
364 */
365 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
366 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
367 public static final String ACTION_TETHER_STATE_CHANGED =
368 TetheringManager.ACTION_TETHER_STATE_CHANGED;
369
370 /**
371 * @hide
372 * gives a String[] listing all the interfaces configured for
373 * tethering and currently available for tethering.
374 */
375 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
376 public static final String EXTRA_AVAILABLE_TETHER = TetheringManager.EXTRA_AVAILABLE_TETHER;
377
378 /**
379 * @hide
380 * gives a String[] listing all the interfaces currently in local-only
381 * mode (ie, has DHCPv4+IPv6-ULA support and no packet forwarding)
382 */
383 public static final String EXTRA_ACTIVE_LOCAL_ONLY = TetheringManager.EXTRA_ACTIVE_LOCAL_ONLY;
384
385 /**
386 * @hide
387 * gives a String[] listing all the interfaces currently tethered
388 * (ie, has DHCPv4 support and packets potentially forwarded/NATed)
389 */
390 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
391 public static final String EXTRA_ACTIVE_TETHER = TetheringManager.EXTRA_ACTIVE_TETHER;
392
393 /**
394 * @hide
395 * gives a String[] listing all the interfaces we tried to tether and
396 * failed. Use {@link #getLastTetherError} to find the error code
397 * for any interfaces listed here.
398 */
399 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
400 public static final String EXTRA_ERRORED_TETHER = TetheringManager.EXTRA_ERRORED_TETHER;
401
402 /**
403 * Broadcast Action: The captive portal tracker has finished its test.
404 * Sent only while running Setup Wizard, in lieu of showing a user
405 * notification.
406 * @hide
407 */
408 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
409 public static final String ACTION_CAPTIVE_PORTAL_TEST_COMPLETED =
410 "android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED";
411 /**
412 * The lookup key for a boolean that indicates whether a captive portal was detected.
413 * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
414 * @hide
415 */
416 public static final String EXTRA_IS_CAPTIVE_PORTAL = "captivePortal";
417
418 /**
419 * Action used to display a dialog that asks the user whether to connect to a network that is
420 * not validated. This intent is used to start the dialog in settings via startActivity.
421 *
422 * @hide
423 */
424 public static final String ACTION_PROMPT_UNVALIDATED = "android.net.conn.PROMPT_UNVALIDATED";
425
426 /**
427 * Action used to display a dialog that asks the user whether to avoid a network that is no
428 * longer validated. This intent is used to start the dialog in settings via startActivity.
429 *
430 * @hide
431 */
432 public static final String ACTION_PROMPT_LOST_VALIDATION =
433 "android.net.conn.PROMPT_LOST_VALIDATION";
434
435 /**
436 * Action used to display a dialog that asks the user whether to stay connected to a network
437 * that has not validated. This intent is used to start the dialog in settings via
438 * startActivity.
439 *
440 * @hide
441 */
442 public static final String ACTION_PROMPT_PARTIAL_CONNECTIVITY =
443 "android.net.conn.PROMPT_PARTIAL_CONNECTIVITY";
444
445 /**
446 * Invalid tethering type.
447 * @see #startTethering(int, boolean, OnStartTetheringCallback)
448 * @hide
449 */
450 public static final int TETHERING_INVALID = TetheringManager.TETHERING_INVALID;
451
452 /**
453 * Wifi tethering type.
454 * @see #startTethering(int, boolean, OnStartTetheringCallback)
455 * @hide
456 */
457 @SystemApi
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +0900458 public static final int TETHERING_WIFI = 0;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900459
460 /**
461 * USB tethering type.
462 * @see #startTethering(int, boolean, OnStartTetheringCallback)
463 * @hide
464 */
465 @SystemApi
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +0900466 public static final int TETHERING_USB = 1;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900467
468 /**
469 * Bluetooth tethering type.
470 * @see #startTethering(int, boolean, OnStartTetheringCallback)
471 * @hide
472 */
473 @SystemApi
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +0900474 public static final int TETHERING_BLUETOOTH = 2;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900475
476 /**
477 * Wifi P2p tethering type.
478 * Wifi P2p tethering is set through events automatically, and don't
479 * need to start from #startTethering(int, boolean, OnStartTetheringCallback).
480 * @hide
481 */
482 public static final int TETHERING_WIFI_P2P = TetheringManager.TETHERING_WIFI_P2P;
483
484 /**
485 * Extra used for communicating with the TetherService. Includes the type of tethering to
486 * enable if any.
487 * @hide
488 */
489 public static final String EXTRA_ADD_TETHER_TYPE = TetheringConstants.EXTRA_ADD_TETHER_TYPE;
490
491 /**
492 * Extra used for communicating with the TetherService. Includes the type of tethering for
493 * which to cancel provisioning.
494 * @hide
495 */
496 public static final String EXTRA_REM_TETHER_TYPE = TetheringConstants.EXTRA_REM_TETHER_TYPE;
497
498 /**
499 * Extra used for communicating with the TetherService. True to schedule a recheck of tether
500 * provisioning.
501 * @hide
502 */
503 public static final String EXTRA_SET_ALARM = TetheringConstants.EXTRA_SET_ALARM;
504
505 /**
506 * Tells the TetherService to run a provision check now.
507 * @hide
508 */
509 public static final String EXTRA_RUN_PROVISION = TetheringConstants.EXTRA_RUN_PROVISION;
510
511 /**
512 * Extra used for communicating with the TetherService. Contains the {@link ResultReceiver}
513 * which will receive provisioning results. Can be left empty.
514 * @hide
515 */
516 public static final String EXTRA_PROVISION_CALLBACK =
517 TetheringConstants.EXTRA_PROVISION_CALLBACK;
518
519 /**
520 * The absence of a connection type.
521 * @hide
522 */
523 @SystemApi
524 public static final int TYPE_NONE = -1;
525
526 /**
527 * A Mobile data connection. Devices may support more than one.
528 *
529 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
530 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
531 * appropriate network. {@see NetworkCapabilities} for supported transports.
532 */
533 @Deprecated
534 public static final int TYPE_MOBILE = 0;
535
536 /**
537 * A WIFI data connection. Devices may support more than one.
538 *
539 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
540 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
541 * appropriate network. {@see NetworkCapabilities} for supported transports.
542 */
543 @Deprecated
544 public static final int TYPE_WIFI = 1;
545
546 /**
547 * An MMS-specific Mobile data connection. This network type may use the
548 * same network interface as {@link #TYPE_MOBILE} or it may use a different
549 * one. This is used by applications needing to talk to the carrier's
550 * Multimedia Messaging Service servers.
551 *
552 * @deprecated Applications should instead use {@link NetworkCapabilities#hasCapability} or
553 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
554 * provides the {@link NetworkCapabilities#NET_CAPABILITY_MMS} capability.
555 */
556 @Deprecated
557 public static final int TYPE_MOBILE_MMS = 2;
558
559 /**
560 * A SUPL-specific Mobile data connection. This network type may use the
561 * same network interface as {@link #TYPE_MOBILE} or it may use a different
562 * one. This is used by applications needing to talk to the carrier's
563 * Secure User Plane Location servers for help locating the device.
564 *
565 * @deprecated Applications should instead use {@link NetworkCapabilities#hasCapability} or
566 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
567 * provides the {@link NetworkCapabilities#NET_CAPABILITY_SUPL} capability.
568 */
569 @Deprecated
570 public static final int TYPE_MOBILE_SUPL = 3;
571
572 /**
573 * A DUN-specific Mobile data connection. This network type may use the
574 * same network interface as {@link #TYPE_MOBILE} or it may use a different
575 * one. This is sometimes by the system when setting up an upstream connection
576 * for tethering so that the carrier is aware of DUN traffic.
577 *
578 * @deprecated Applications should instead use {@link NetworkCapabilities#hasCapability} or
579 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
580 * provides the {@link NetworkCapabilities#NET_CAPABILITY_DUN} capability.
581 */
582 @Deprecated
583 public static final int TYPE_MOBILE_DUN = 4;
584
585 /**
586 * A High Priority Mobile data connection. This network type uses the
587 * same network interface as {@link #TYPE_MOBILE} but the routing setup
588 * is different.
589 *
590 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
591 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
592 * appropriate network. {@see NetworkCapabilities} for supported transports.
593 */
594 @Deprecated
595 public static final int TYPE_MOBILE_HIPRI = 5;
596
597 /**
598 * A WiMAX data connection.
599 *
600 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
601 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
602 * appropriate network. {@see NetworkCapabilities} for supported transports.
603 */
604 @Deprecated
605 public static final int TYPE_WIMAX = 6;
606
607 /**
608 * A Bluetooth data connection.
609 *
610 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
611 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
612 * appropriate network. {@see NetworkCapabilities} for supported transports.
613 */
614 @Deprecated
615 public static final int TYPE_BLUETOOTH = 7;
616
617 /**
618 * Fake data connection. This should not be used on shipping devices.
619 * @deprecated This is not used any more.
620 */
621 @Deprecated
622 public static final int TYPE_DUMMY = 8;
623
624 /**
625 * An Ethernet data connection.
626 *
627 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
628 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
629 * appropriate network. {@see NetworkCapabilities} for supported transports.
630 */
631 @Deprecated
632 public static final int TYPE_ETHERNET = 9;
633
634 /**
635 * Over the air Administration.
636 * @deprecated Use {@link NetworkCapabilities} instead.
637 * {@hide}
638 */
639 @Deprecated
640 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
641 public static final int TYPE_MOBILE_FOTA = 10;
642
643 /**
644 * IP Multimedia Subsystem.
645 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_IMS} instead.
646 * {@hide}
647 */
648 @Deprecated
649 @UnsupportedAppUsage
650 public static final int TYPE_MOBILE_IMS = 11;
651
652 /**
653 * Carrier Branded Services.
654 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_CBS} instead.
655 * {@hide}
656 */
657 @Deprecated
658 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
659 public static final int TYPE_MOBILE_CBS = 12;
660
661 /**
662 * A Wi-Fi p2p connection. Only requesting processes will have access to
663 * the peers connected.
664 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_WIFI_P2P} instead.
665 * {@hide}
666 */
667 @Deprecated
668 @SystemApi
669 public static final int TYPE_WIFI_P2P = 13;
670
671 /**
672 * The network to use for initially attaching to the network
673 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_IA} instead.
674 * {@hide}
675 */
676 @Deprecated
677 @UnsupportedAppUsage
678 public static final int TYPE_MOBILE_IA = 14;
679
680 /**
681 * Emergency PDN connection for emergency services. This
682 * may include IMS and MMS in emergency situations.
683 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_EIMS} instead.
684 * {@hide}
685 */
686 @Deprecated
687 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
688 public static final int TYPE_MOBILE_EMERGENCY = 15;
689
690 /**
691 * The network that uses proxy to achieve connectivity.
692 * @deprecated Use {@link NetworkCapabilities} instead.
693 * {@hide}
694 */
695 @Deprecated
696 @SystemApi
697 public static final int TYPE_PROXY = 16;
698
699 /**
700 * A virtual network using one or more native bearers.
701 * It may or may not be providing security services.
702 * @deprecated Applications should use {@link NetworkCapabilities#TRANSPORT_VPN} instead.
703 */
704 @Deprecated
705 public static final int TYPE_VPN = 17;
706
707 /**
708 * A network that is exclusively meant to be used for testing
709 *
710 * @deprecated Use {@link NetworkCapabilities} instead.
711 * @hide
712 */
713 @Deprecated
714 public static final int TYPE_TEST = 18; // TODO: Remove this once NetworkTypes are unused.
715
716 /**
717 * @deprecated Use {@link NetworkCapabilities} instead.
718 * @hide
719 */
720 @Deprecated
721 @Retention(RetentionPolicy.SOURCE)
722 @IntDef(prefix = { "TYPE_" }, value = {
723 TYPE_NONE,
724 TYPE_MOBILE,
725 TYPE_WIFI,
726 TYPE_MOBILE_MMS,
727 TYPE_MOBILE_SUPL,
728 TYPE_MOBILE_DUN,
729 TYPE_MOBILE_HIPRI,
730 TYPE_WIMAX,
731 TYPE_BLUETOOTH,
732 TYPE_DUMMY,
733 TYPE_ETHERNET,
734 TYPE_MOBILE_FOTA,
735 TYPE_MOBILE_IMS,
736 TYPE_MOBILE_CBS,
737 TYPE_WIFI_P2P,
738 TYPE_MOBILE_IA,
739 TYPE_MOBILE_EMERGENCY,
740 TYPE_PROXY,
741 TYPE_VPN,
742 TYPE_TEST
743 })
744 public @interface LegacyNetworkType {}
745
746 // Deprecated constants for return values of startUsingNetworkFeature. They used to live
747 // in com.android.internal.telephony.PhoneConstants until they were made inaccessible.
748 private static final int DEPRECATED_PHONE_CONSTANT_APN_ALREADY_ACTIVE = 0;
749 private static final int DEPRECATED_PHONE_CONSTANT_APN_REQUEST_STARTED = 1;
750 private static final int DEPRECATED_PHONE_CONSTANT_APN_REQUEST_FAILED = 3;
751
752 /** {@hide} */
753 public static final int MAX_RADIO_TYPE = TYPE_TEST;
754
755 /** {@hide} */
756 public static final int MAX_NETWORK_TYPE = TYPE_TEST;
757
758 private static final int MIN_NETWORK_TYPE = TYPE_MOBILE;
759
760 /**
761 * If you want to set the default network preference,you can directly
762 * change the networkAttributes array in framework's config.xml.
763 *
764 * @deprecated Since we support so many more networks now, the single
765 * network default network preference can't really express
766 * the hierarchy. Instead, the default is defined by the
767 * networkAttributes in config.xml. You can determine
768 * the current value by calling {@link #getNetworkPreference()}
769 * from an App.
770 */
771 @Deprecated
772 public static final int DEFAULT_NETWORK_PREFERENCE = TYPE_WIFI;
773
774 /**
775 * @hide
776 */
777 public static final int REQUEST_ID_UNSET = 0;
778
779 /**
780 * Static unique request used as a tombstone for NetworkCallbacks that have been unregistered.
781 * This allows to distinguish when unregistering NetworkCallbacks those that were never
782 * registered from those that were already unregistered.
783 * @hide
784 */
785 private static final NetworkRequest ALREADY_UNREGISTERED =
786 new NetworkRequest.Builder().clearCapabilities().build();
787
788 /**
789 * A NetID indicating no Network is selected.
790 * Keep in sync with bionic/libc/dns/include/resolv_netid.h
791 * @hide
792 */
793 public static final int NETID_UNSET = 0;
794
795 /**
796 * Private DNS Mode values.
797 *
798 * The "private_dns_mode" global setting stores a String value which is
799 * expected to be one of the following.
800 */
801
802 /**
803 * @hide
804 */
805 public static final String PRIVATE_DNS_MODE_OFF = "off";
806 /**
807 * @hide
808 */
809 public static final String PRIVATE_DNS_MODE_OPPORTUNISTIC = "opportunistic";
810 /**
811 * @hide
812 */
813 public static final String PRIVATE_DNS_MODE_PROVIDER_HOSTNAME = "hostname";
814 /**
815 * The default Private DNS mode.
816 *
817 * This may change from release to release or may become dependent upon
818 * the capabilities of the underlying platform.
819 *
820 * @hide
821 */
822 public static final String PRIVATE_DNS_DEFAULT_MODE_FALLBACK = PRIVATE_DNS_MODE_OPPORTUNISTIC;
823
824 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
825 private final IConnectivityManager mService;
Lorenzo Colitti842075e2021-02-04 17:32:07 +0900826
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900827 /**
828 * A kludge to facilitate static access where a Context pointer isn't available, like in the
829 * case of the static set/getProcessDefaultNetwork methods and from the Network class.
830 * TODO: Remove this after deprecating the static methods in favor of non-static methods or
831 * methods that take a Context argument.
832 */
833 private static ConnectivityManager sInstance;
834
835 private final Context mContext;
836
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900837 private INetworkPolicyManager mNPManager;
838 private final TetheringManager mTetheringManager;
839
840 /**
841 * Tests if a given integer represents a valid network type.
842 * @param networkType the type to be tested
843 * @return a boolean. {@code true} if the type is valid, else {@code false}
844 * @deprecated All APIs accepting a network type are deprecated. There should be no need to
845 * validate a network type.
846 */
847 @Deprecated
848 public static boolean isNetworkTypeValid(int networkType) {
849 return MIN_NETWORK_TYPE <= networkType && networkType <= MAX_NETWORK_TYPE;
850 }
851
852 /**
853 * Returns a non-localized string representing a given network type.
854 * ONLY used for debugging output.
855 * @param type the type needing naming
856 * @return a String for the given type, or a string version of the type ("87")
857 * if no name is known.
858 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
859 * {@hide}
860 */
861 @Deprecated
862 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
863 public static String getNetworkTypeName(int type) {
864 switch (type) {
865 case TYPE_NONE:
866 return "NONE";
867 case TYPE_MOBILE:
868 return "MOBILE";
869 case TYPE_WIFI:
870 return "WIFI";
871 case TYPE_MOBILE_MMS:
872 return "MOBILE_MMS";
873 case TYPE_MOBILE_SUPL:
874 return "MOBILE_SUPL";
875 case TYPE_MOBILE_DUN:
876 return "MOBILE_DUN";
877 case TYPE_MOBILE_HIPRI:
878 return "MOBILE_HIPRI";
879 case TYPE_WIMAX:
880 return "WIMAX";
881 case TYPE_BLUETOOTH:
882 return "BLUETOOTH";
883 case TYPE_DUMMY:
884 return "DUMMY";
885 case TYPE_ETHERNET:
886 return "ETHERNET";
887 case TYPE_MOBILE_FOTA:
888 return "MOBILE_FOTA";
889 case TYPE_MOBILE_IMS:
890 return "MOBILE_IMS";
891 case TYPE_MOBILE_CBS:
892 return "MOBILE_CBS";
893 case TYPE_WIFI_P2P:
894 return "WIFI_P2P";
895 case TYPE_MOBILE_IA:
896 return "MOBILE_IA";
897 case TYPE_MOBILE_EMERGENCY:
898 return "MOBILE_EMERGENCY";
899 case TYPE_PROXY:
900 return "PROXY";
901 case TYPE_VPN:
902 return "VPN";
903 default:
904 return Integer.toString(type);
905 }
906 }
907
908 /**
909 * @hide
910 * TODO: Expose for SystemServer when becomes a module.
911 */
912 public void systemReady() {
913 try {
914 mService.systemReady();
915 } catch (RemoteException e) {
916 throw e.rethrowFromSystemServer();
917 }
918 }
919
920 /**
921 * Checks if a given type uses the cellular data connection.
922 * This should be replaced in the future by a network property.
923 * @param networkType the type to check
924 * @return a boolean - {@code true} if uses cellular network, else {@code false}
925 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
926 * {@hide}
927 */
928 @Deprecated
929 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
930 public static boolean isNetworkTypeMobile(int networkType) {
931 switch (networkType) {
932 case TYPE_MOBILE:
933 case TYPE_MOBILE_MMS:
934 case TYPE_MOBILE_SUPL:
935 case TYPE_MOBILE_DUN:
936 case TYPE_MOBILE_HIPRI:
937 case TYPE_MOBILE_FOTA:
938 case TYPE_MOBILE_IMS:
939 case TYPE_MOBILE_CBS:
940 case TYPE_MOBILE_IA:
941 case TYPE_MOBILE_EMERGENCY:
942 return true;
943 default:
944 return false;
945 }
946 }
947
948 /**
949 * Checks if the given network type is backed by a Wi-Fi radio.
950 *
951 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
952 * @hide
953 */
954 @Deprecated
955 public static boolean isNetworkTypeWifi(int networkType) {
956 switch (networkType) {
957 case TYPE_WIFI:
958 case TYPE_WIFI_P2P:
959 return true;
960 default:
961 return false;
962 }
963 }
964
965 /**
966 * Specifies the preferred network type. When the device has more
967 * than one type available the preferred network type will be used.
968 *
969 * @param preference the network type to prefer over all others. It is
970 * unspecified what happens to the old preferred network in the
971 * overall ordering.
972 * @deprecated Functionality has been removed as it no longer makes sense,
973 * with many more than two networks - we'd need an array to express
974 * preference. Instead we use dynamic network properties of
975 * the networks to describe their precedence.
976 */
977 @Deprecated
978 public void setNetworkPreference(int preference) {
979 }
980
981 /**
982 * Retrieves the current preferred network type.
983 *
984 * @return an integer representing the preferred network type
985 *
986 * @deprecated Functionality has been removed as it no longer makes sense,
987 * with many more than two networks - we'd need an array to express
988 * preference. Instead we use dynamic network properties of
989 * the networks to describe their precedence.
990 */
991 @Deprecated
992 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
993 public int getNetworkPreference() {
994 return TYPE_NONE;
995 }
996
997 /**
998 * Returns details about the currently active default data network. When
999 * connected, this network is the default route for outgoing connections.
1000 * You should always check {@link NetworkInfo#isConnected()} before initiating
1001 * network traffic. This may return {@code null} when there is no default
1002 * network.
1003 * Note that if the default network is a VPN, this method will return the
1004 * NetworkInfo for one of its underlying networks instead, or null if the
1005 * VPN agent did not specify any. Apps interested in learning about VPNs
1006 * should use {@link #getNetworkInfo(android.net.Network)} instead.
1007 *
1008 * @return a {@link NetworkInfo} object for the current default network
1009 * or {@code null} if no default network is currently active
1010 * @deprecated See {@link NetworkInfo}.
1011 */
1012 @Deprecated
1013 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1014 @Nullable
1015 public NetworkInfo getActiveNetworkInfo() {
1016 try {
1017 return mService.getActiveNetworkInfo();
1018 } catch (RemoteException e) {
1019 throw e.rethrowFromSystemServer();
1020 }
1021 }
1022
1023 /**
1024 * Returns a {@link Network} object corresponding to the currently active
1025 * default data network. In the event that the current active default data
1026 * network disconnects, the returned {@code Network} object will no longer
1027 * be usable. This will return {@code null} when there is no default
1028 * network.
1029 *
1030 * @return a {@link Network} object for the current default network or
1031 * {@code null} if no default network is currently active
1032 */
1033 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1034 @Nullable
1035 public Network getActiveNetwork() {
1036 try {
1037 return mService.getActiveNetwork();
1038 } catch (RemoteException e) {
1039 throw e.rethrowFromSystemServer();
1040 }
1041 }
1042
1043 /**
1044 * Returns a {@link Network} object corresponding to the currently active
1045 * default data network for a specific UID. In the event that the default data
1046 * network disconnects, the returned {@code Network} object will no longer
1047 * be usable. This will return {@code null} when there is no default
1048 * network for the UID.
1049 *
1050 * @return a {@link Network} object for the current default network for the
1051 * given UID or {@code null} if no default network is currently active
1052 *
1053 * @hide
1054 */
1055 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
1056 @Nullable
1057 public Network getActiveNetworkForUid(int uid) {
1058 return getActiveNetworkForUid(uid, false);
1059 }
1060
1061 /** {@hide} */
1062 public Network getActiveNetworkForUid(int uid, boolean ignoreBlocked) {
1063 try {
1064 return mService.getActiveNetworkForUid(uid, ignoreBlocked);
1065 } catch (RemoteException e) {
1066 throw e.rethrowFromSystemServer();
1067 }
1068 }
1069
1070 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001071 * Adds or removes a requirement for given UID ranges to use the VPN.
1072 *
1073 * If set to {@code true}, informs the system that the UIDs in the specified ranges must not
1074 * have any connectivity except if a VPN is connected and applies to the UIDs, or if the UIDs
1075 * otherwise have permission to bypass the VPN (e.g., because they have the
1076 * {@link android.Manifest.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS} permission, or when
1077 * using a socket protected by a method such as {@link VpnService#protect(DatagramSocket)}. If
1078 * set to {@code false}, a previously-added restriction is removed.
1079 * <p>
1080 * Each of the UID ranges specified by this method is added and removed as is, and no processing
1081 * is performed on the ranges to de-duplicate, merge, split, or intersect them. In order to
1082 * remove a previously-added range, the exact range must be removed as is.
1083 * <p>
1084 * The changes are applied asynchronously and may not have been applied by the time the method
1085 * returns. Apps will be notified about any changes that apply to them via
1086 * {@link NetworkCallback#onBlockedStatusChanged} callbacks called after the changes take
1087 * effect.
1088 * <p>
1089 * This method should be called only by the VPN code.
1090 *
1091 * @param ranges the UID ranges to restrict
1092 * @param requireVpn whether the specified UID ranges must use a VPN
1093 *
1094 * TODO: expose as @SystemApi.
1095 * @hide
1096 */
1097 @RequiresPermission(anyOf = {
1098 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
1099 android.Manifest.permission.NETWORK_STACK})
1100 public void setRequireVpnForUids(boolean requireVpn,
1101 @NonNull Collection<Range<Integer>> ranges) {
1102 Objects.requireNonNull(ranges);
1103 // The Range class is not parcelable. Convert to UidRange, which is what is used internally.
1104 // This method is not necessarily expected to be used outside the system server, so
1105 // parceling may not be necessary, but it could be used out-of-process, e.g., by the network
1106 // stack process, or by tests.
1107 UidRange[] rangesArray = new UidRange[ranges.size()];
1108 int index = 0;
1109 for (Range<Integer> range : ranges) {
1110 rangesArray[index++] = new UidRange(range.getLower(), range.getUpper());
1111 }
1112 try {
1113 mService.setRequireVpnForUids(requireVpn, rangesArray);
1114 } catch (RemoteException e) {
1115 throw e.rethrowFromSystemServer();
1116 }
1117 }
1118
1119 /**
Lorenzo Colittic71cff82021-01-15 01:29:01 +09001120 * Informs ConnectivityService of whether the legacy lockdown VPN, as implemented by
1121 * LockdownVpnTracker, is in use. This is deprecated for new devices starting from Android 12
1122 * but is still supported for backwards compatibility.
1123 * <p>
1124 * This type of VPN is assumed always to use the system default network, and must always declare
1125 * exactly one underlying network, which is the network that was the default when the VPN
1126 * connected.
1127 * <p>
1128 * Calling this method with {@code true} enables legacy behaviour, specifically:
1129 * <ul>
1130 * <li>Any VPN that applies to userId 0 behaves specially with respect to deprecated
1131 * {@link #CONNECTIVITY_ACTION} broadcasts. Any such broadcasts will have the state in the
1132 * {@link #EXTRA_NETWORK_INFO} replaced by state of the VPN network. Also, any time the VPN
1133 * connects, a {@link #CONNECTIVITY_ACTION} broadcast will be sent for the network
1134 * underlying the VPN.</li>
1135 * <li>Deprecated APIs that return {@link NetworkInfo} objects will have their state
1136 * similarly replaced by the VPN network state.</li>
1137 * <li>Information on current network interfaces passed to NetworkStatsService will not
1138 * include any VPN interfaces.</li>
1139 * </ul>
1140 *
1141 * @param enabled whether legacy lockdown VPN is enabled or disabled
1142 *
1143 * TODO: @SystemApi(client = MODULE_LIBRARIES)
1144 *
1145 * @hide
1146 */
1147 @RequiresPermission(anyOf = {
1148 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
1149 android.Manifest.permission.NETWORK_SETTINGS})
1150 public void setLegacyLockdownVpnEnabled(boolean enabled) {
1151 try {
1152 mService.setLegacyLockdownVpnEnabled(enabled);
1153 } catch (RemoteException e) {
1154 throw e.rethrowFromSystemServer();
1155 }
1156 }
1157
1158 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001159 * Returns details about the currently active default data network
1160 * for a given uid. This is for internal use only to avoid spying
1161 * other apps.
1162 *
1163 * @return a {@link NetworkInfo} object for the current default network
1164 * for the given uid or {@code null} if no default network is
1165 * available for the specified uid.
1166 *
1167 * {@hide}
1168 */
1169 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
1170 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1171 public NetworkInfo getActiveNetworkInfoForUid(int uid) {
1172 return getActiveNetworkInfoForUid(uid, false);
1173 }
1174
1175 /** {@hide} */
1176 public NetworkInfo getActiveNetworkInfoForUid(int uid, boolean ignoreBlocked) {
1177 try {
1178 return mService.getActiveNetworkInfoForUid(uid, ignoreBlocked);
1179 } catch (RemoteException e) {
1180 throw e.rethrowFromSystemServer();
1181 }
1182 }
1183
1184 /**
1185 * Returns connection status information about a particular
1186 * network type.
1187 *
1188 * @param networkType integer specifying which networkType in
1189 * which you're interested.
1190 * @return a {@link NetworkInfo} object for the requested
1191 * network type or {@code null} if the type is not
1192 * supported by the device. If {@code networkType} is
1193 * TYPE_VPN and a VPN is active for the calling app,
1194 * then this method will try to return one of the
1195 * underlying networks for the VPN or null if the
1196 * VPN agent didn't specify any.
1197 *
1198 * @deprecated This method does not support multiple connected networks
1199 * of the same type. Use {@link #getAllNetworks} and
1200 * {@link #getNetworkInfo(android.net.Network)} instead.
1201 */
1202 @Deprecated
1203 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1204 @Nullable
1205 public NetworkInfo getNetworkInfo(int networkType) {
1206 try {
1207 return mService.getNetworkInfo(networkType);
1208 } catch (RemoteException e) {
1209 throw e.rethrowFromSystemServer();
1210 }
1211 }
1212
1213 /**
1214 * Returns connection status information about a particular
1215 * Network.
1216 *
1217 * @param network {@link Network} specifying which network
1218 * in which you're interested.
1219 * @return a {@link NetworkInfo} object for the requested
1220 * network or {@code null} if the {@code Network}
1221 * is not valid.
1222 * @deprecated See {@link NetworkInfo}.
1223 */
1224 @Deprecated
1225 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1226 @Nullable
1227 public NetworkInfo getNetworkInfo(@Nullable Network network) {
1228 return getNetworkInfoForUid(network, Process.myUid(), false);
1229 }
1230
1231 /** {@hide} */
1232 public NetworkInfo getNetworkInfoForUid(Network network, int uid, boolean ignoreBlocked) {
1233 try {
1234 return mService.getNetworkInfoForUid(network, uid, ignoreBlocked);
1235 } catch (RemoteException e) {
1236 throw e.rethrowFromSystemServer();
1237 }
1238 }
1239
1240 /**
1241 * Returns connection status information about all network
1242 * types supported by the device.
1243 *
1244 * @return an array of {@link NetworkInfo} objects. Check each
1245 * {@link NetworkInfo#getType} for which type each applies.
1246 *
1247 * @deprecated This method does not support multiple connected networks
1248 * of the same type. Use {@link #getAllNetworks} and
1249 * {@link #getNetworkInfo(android.net.Network)} instead.
1250 */
1251 @Deprecated
1252 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1253 @NonNull
1254 public NetworkInfo[] getAllNetworkInfo() {
1255 try {
1256 return mService.getAllNetworkInfo();
1257 } catch (RemoteException e) {
1258 throw e.rethrowFromSystemServer();
1259 }
1260 }
1261
1262 /**
junyulaib1211372021-03-03 12:09:05 +08001263 * Return a list of {@link NetworkStateSnapshot}s, one for each network that is currently
1264 * connected.
1265 * @hide
1266 */
1267 @SystemApi(client = MODULE_LIBRARIES)
1268 @RequiresPermission(anyOf = {
1269 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
1270 android.Manifest.permission.NETWORK_STACK,
1271 android.Manifest.permission.NETWORK_SETTINGS})
1272 @NonNull
1273 public List<NetworkStateSnapshot> getAllNetworkStateSnapshot() {
1274 try {
1275 return mService.getAllNetworkStateSnapshot();
1276 } catch (RemoteException e) {
1277 throw e.rethrowFromSystemServer();
1278 }
1279 }
1280
1281 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001282 * Returns the {@link Network} object currently serving a given type, or
1283 * null if the given type is not connected.
1284 *
1285 * @hide
1286 * @deprecated This method does not support multiple connected networks
1287 * of the same type. Use {@link #getAllNetworks} and
1288 * {@link #getNetworkInfo(android.net.Network)} instead.
1289 */
1290 @Deprecated
1291 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1292 @UnsupportedAppUsage
1293 public Network getNetworkForType(int networkType) {
1294 try {
1295 return mService.getNetworkForType(networkType);
1296 } catch (RemoteException e) {
1297 throw e.rethrowFromSystemServer();
1298 }
1299 }
1300
1301 /**
1302 * Returns an array of all {@link Network} currently tracked by the
1303 * framework.
1304 *
1305 * @return an array of {@link Network} objects.
1306 */
1307 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1308 @NonNull
1309 public Network[] getAllNetworks() {
1310 try {
1311 return mService.getAllNetworks();
1312 } catch (RemoteException e) {
1313 throw e.rethrowFromSystemServer();
1314 }
1315 }
1316
1317 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08001318 * Returns an array of {@link NetworkCapabilities} objects, representing
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001319 * the Networks that applications run by the given user will use by default.
1320 * @hide
1321 */
1322 @UnsupportedAppUsage
1323 public NetworkCapabilities[] getDefaultNetworkCapabilitiesForUser(int userId) {
1324 try {
1325 return mService.getDefaultNetworkCapabilitiesForUser(
Roshan Piusa8a477b2020-12-17 14:53:09 -08001326 userId, mContext.getOpPackageName(), getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001327 } catch (RemoteException e) {
1328 throw e.rethrowFromSystemServer();
1329 }
1330 }
1331
1332 /**
1333 * Returns the IP information for the current default network.
1334 *
1335 * @return a {@link LinkProperties} object describing the IP info
1336 * for the current default network, or {@code null} if there
1337 * is no current default network.
1338 *
1339 * {@hide}
1340 * @deprecated please use {@link #getLinkProperties(Network)} on the return
1341 * value of {@link #getActiveNetwork()} instead. In particular,
1342 * this method will return non-null LinkProperties even if the
1343 * app is blocked by policy from using this network.
1344 */
1345 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1346 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 109783091)
1347 public LinkProperties getActiveLinkProperties() {
1348 try {
1349 return mService.getActiveLinkProperties();
1350 } catch (RemoteException e) {
1351 throw e.rethrowFromSystemServer();
1352 }
1353 }
1354
1355 /**
1356 * Returns the IP information for a given network type.
1357 *
1358 * @param networkType the network type of interest.
1359 * @return a {@link LinkProperties} object describing the IP info
1360 * for the given networkType, or {@code null} if there is
1361 * no current default network.
1362 *
1363 * {@hide}
1364 * @deprecated This method does not support multiple connected networks
1365 * of the same type. Use {@link #getAllNetworks},
1366 * {@link #getNetworkInfo(android.net.Network)}, and
1367 * {@link #getLinkProperties(android.net.Network)} instead.
1368 */
1369 @Deprecated
1370 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1371 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
1372 public LinkProperties getLinkProperties(int networkType) {
1373 try {
1374 return mService.getLinkPropertiesForType(networkType);
1375 } catch (RemoteException e) {
1376 throw e.rethrowFromSystemServer();
1377 }
1378 }
1379
1380 /**
1381 * Get the {@link LinkProperties} for the given {@link Network}. This
1382 * will return {@code null} if the network is unknown.
1383 *
1384 * @param network The {@link Network} object identifying the network in question.
1385 * @return The {@link LinkProperties} for the network, or {@code null}.
1386 */
1387 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1388 @Nullable
1389 public LinkProperties getLinkProperties(@Nullable Network network) {
1390 try {
1391 return mService.getLinkProperties(network);
1392 } catch (RemoteException e) {
1393 throw e.rethrowFromSystemServer();
1394 }
1395 }
1396
1397 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08001398 * Get the {@link NetworkCapabilities} for the given {@link Network}. This
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001399 * will return {@code null} if the network is unknown.
1400 *
Roshan Piuse08bc182020-12-22 15:10:42 -08001401 * This will remove any location sensitive data in {@link TransportInfo} embedded in
1402 * {@link NetworkCapabilities#getTransportInfo()}. Some transport info instances like
1403 * {@link android.net.wifi.WifiInfo} contain location sensitive information. Retrieving
1404 * this location sensitive information (subject to app's location permissions) will be
1405 * noted by system. To include any location sensitive data in {@link TransportInfo},
1406 * use a {@link NetworkCallback} with
1407 * {@link NetworkCallback#FLAG_INCLUDE_LOCATION_INFO} flag.
1408 *
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001409 * @param network The {@link Network} object identifying the network in question.
Roshan Piuse08bc182020-12-22 15:10:42 -08001410 * @return The {@link NetworkCapabilities} for the network, or {@code null}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001411 */
1412 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1413 @Nullable
1414 public NetworkCapabilities getNetworkCapabilities(@Nullable Network network) {
1415 try {
Roshan Piusa8a477b2020-12-17 14:53:09 -08001416 return mService.getNetworkCapabilities(
1417 network, mContext.getOpPackageName(), getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001418 } catch (RemoteException e) {
1419 throw e.rethrowFromSystemServer();
1420 }
1421 }
1422
1423 /**
1424 * Gets a URL that can be used for resolving whether a captive portal is present.
1425 * 1. This URL should respond with a 204 response to a GET request to indicate no captive
1426 * portal is present.
1427 * 2. This URL must be HTTP as redirect responses are used to find captive portal
1428 * sign-in pages. Captive portals cannot respond to HTTPS requests with redirects.
1429 *
1430 * The system network validation may be using different strategies to detect captive portals,
1431 * so this method does not necessarily return a URL used by the system. It only returns a URL
1432 * that may be relevant for other components trying to detect captive portals.
1433 *
1434 * @hide
1435 * @deprecated This API returns URL which is not guaranteed to be one of the URLs used by the
1436 * system.
1437 */
1438 @Deprecated
1439 @SystemApi
1440 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
1441 public String getCaptivePortalServerUrl() {
1442 try {
1443 return mService.getCaptivePortalServerUrl();
1444 } catch (RemoteException e) {
1445 throw e.rethrowFromSystemServer();
1446 }
1447 }
1448
1449 /**
1450 * Tells the underlying networking system that the caller wants to
1451 * begin using the named feature. The interpretation of {@code feature}
1452 * is completely up to each networking implementation.
1453 *
1454 * <p>This method requires the caller to hold either the
1455 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
1456 * or the ability to modify system settings as determined by
1457 * {@link android.provider.Settings.System#canWrite}.</p>
1458 *
1459 * @param networkType specifies which network the request pertains to
1460 * @param feature the name of the feature to be used
1461 * @return an integer value representing the outcome of the request.
1462 * The interpretation of this value is specific to each networking
1463 * implementation+feature combination, except that the value {@code -1}
1464 * always indicates failure.
1465 *
1466 * @deprecated Deprecated in favor of the cleaner
1467 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} API.
1468 * In {@link VERSION_CODES#M}, and above, this method is unsupported and will
1469 * throw {@code UnsupportedOperationException} if called.
1470 * @removed
1471 */
1472 @Deprecated
1473 public int startUsingNetworkFeature(int networkType, String feature) {
1474 checkLegacyRoutingApiAccess();
1475 NetworkCapabilities netCap = networkCapabilitiesForFeature(networkType, feature);
1476 if (netCap == null) {
1477 Log.d(TAG, "Can't satisfy startUsingNetworkFeature for " + networkType + ", " +
1478 feature);
1479 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_FAILED;
1480 }
1481
1482 NetworkRequest request = null;
1483 synchronized (sLegacyRequests) {
1484 LegacyRequest l = sLegacyRequests.get(netCap);
1485 if (l != null) {
1486 Log.d(TAG, "renewing startUsingNetworkFeature request " + l.networkRequest);
1487 renewRequestLocked(l);
1488 if (l.currentNetwork != null) {
1489 return DEPRECATED_PHONE_CONSTANT_APN_ALREADY_ACTIVE;
1490 } else {
1491 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_STARTED;
1492 }
1493 }
1494
1495 request = requestNetworkForFeatureLocked(netCap);
1496 }
1497 if (request != null) {
1498 Log.d(TAG, "starting startUsingNetworkFeature for request " + request);
1499 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_STARTED;
1500 } else {
1501 Log.d(TAG, " request Failed");
1502 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_FAILED;
1503 }
1504 }
1505
1506 /**
1507 * Tells the underlying networking system that the caller is finished
1508 * using the named feature. The interpretation of {@code feature}
1509 * is completely up to each networking implementation.
1510 *
1511 * <p>This method requires the caller to hold either the
1512 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
1513 * or the ability to modify system settings as determined by
1514 * {@link android.provider.Settings.System#canWrite}.</p>
1515 *
1516 * @param networkType specifies which network the request pertains to
1517 * @param feature the name of the feature that is no longer needed
1518 * @return an integer value representing the outcome of the request.
1519 * The interpretation of this value is specific to each networking
1520 * implementation+feature combination, except that the value {@code -1}
1521 * always indicates failure.
1522 *
1523 * @deprecated Deprecated in favor of the cleaner
1524 * {@link #unregisterNetworkCallback(NetworkCallback)} API.
1525 * In {@link VERSION_CODES#M}, and above, this method is unsupported and will
1526 * throw {@code UnsupportedOperationException} if called.
1527 * @removed
1528 */
1529 @Deprecated
1530 public int stopUsingNetworkFeature(int networkType, String feature) {
1531 checkLegacyRoutingApiAccess();
1532 NetworkCapabilities netCap = networkCapabilitiesForFeature(networkType, feature);
1533 if (netCap == null) {
1534 Log.d(TAG, "Can't satisfy stopUsingNetworkFeature for " + networkType + ", " +
1535 feature);
1536 return -1;
1537 }
1538
1539 if (removeRequestForFeature(netCap)) {
1540 Log.d(TAG, "stopUsingNetworkFeature for " + networkType + ", " + feature);
1541 }
1542 return 1;
1543 }
1544
1545 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1546 private NetworkCapabilities networkCapabilitiesForFeature(int networkType, String feature) {
1547 if (networkType == TYPE_MOBILE) {
1548 switch (feature) {
1549 case "enableCBS":
1550 return networkCapabilitiesForType(TYPE_MOBILE_CBS);
1551 case "enableDUN":
1552 case "enableDUNAlways":
1553 return networkCapabilitiesForType(TYPE_MOBILE_DUN);
1554 case "enableFOTA":
1555 return networkCapabilitiesForType(TYPE_MOBILE_FOTA);
1556 case "enableHIPRI":
1557 return networkCapabilitiesForType(TYPE_MOBILE_HIPRI);
1558 case "enableIMS":
1559 return networkCapabilitiesForType(TYPE_MOBILE_IMS);
1560 case "enableMMS":
1561 return networkCapabilitiesForType(TYPE_MOBILE_MMS);
1562 case "enableSUPL":
1563 return networkCapabilitiesForType(TYPE_MOBILE_SUPL);
1564 default:
1565 return null;
1566 }
1567 } else if (networkType == TYPE_WIFI && "p2p".equals(feature)) {
1568 return networkCapabilitiesForType(TYPE_WIFI_P2P);
1569 }
1570 return null;
1571 }
1572
1573 private int legacyTypeForNetworkCapabilities(NetworkCapabilities netCap) {
1574 if (netCap == null) return TYPE_NONE;
1575 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_CBS)) {
1576 return TYPE_MOBILE_CBS;
1577 }
1578 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_IMS)) {
1579 return TYPE_MOBILE_IMS;
1580 }
1581 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_FOTA)) {
1582 return TYPE_MOBILE_FOTA;
1583 }
1584 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_DUN)) {
1585 return TYPE_MOBILE_DUN;
1586 }
1587 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_SUPL)) {
1588 return TYPE_MOBILE_SUPL;
1589 }
1590 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_MMS)) {
1591 return TYPE_MOBILE_MMS;
1592 }
1593 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_INTERNET)) {
1594 return TYPE_MOBILE_HIPRI;
1595 }
1596 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_WIFI_P2P)) {
1597 return TYPE_WIFI_P2P;
1598 }
1599 return TYPE_NONE;
1600 }
1601
1602 private static class LegacyRequest {
1603 NetworkCapabilities networkCapabilities;
1604 NetworkRequest networkRequest;
1605 int expireSequenceNumber;
1606 Network currentNetwork;
1607 int delay = -1;
1608
1609 private void clearDnsBinding() {
1610 if (currentNetwork != null) {
1611 currentNetwork = null;
1612 setProcessDefaultNetworkForHostResolution(null);
1613 }
1614 }
1615
1616 NetworkCallback networkCallback = new NetworkCallback() {
1617 @Override
1618 public void onAvailable(Network network) {
1619 currentNetwork = network;
1620 Log.d(TAG, "startUsingNetworkFeature got Network:" + network);
1621 setProcessDefaultNetworkForHostResolution(network);
1622 }
1623 @Override
1624 public void onLost(Network network) {
1625 if (network.equals(currentNetwork)) clearDnsBinding();
1626 Log.d(TAG, "startUsingNetworkFeature lost Network:" + network);
1627 }
1628 };
1629 }
1630
1631 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1632 private static final HashMap<NetworkCapabilities, LegacyRequest> sLegacyRequests =
1633 new HashMap<>();
1634
1635 private NetworkRequest findRequestForFeature(NetworkCapabilities netCap) {
1636 synchronized (sLegacyRequests) {
1637 LegacyRequest l = sLegacyRequests.get(netCap);
1638 if (l != null) return l.networkRequest;
1639 }
1640 return null;
1641 }
1642
1643 private void renewRequestLocked(LegacyRequest l) {
1644 l.expireSequenceNumber++;
1645 Log.d(TAG, "renewing request to seqNum " + l.expireSequenceNumber);
1646 sendExpireMsgForFeature(l.networkCapabilities, l.expireSequenceNumber, l.delay);
1647 }
1648
1649 private void expireRequest(NetworkCapabilities netCap, int sequenceNum) {
1650 int ourSeqNum = -1;
1651 synchronized (sLegacyRequests) {
1652 LegacyRequest l = sLegacyRequests.get(netCap);
1653 if (l == null) return;
1654 ourSeqNum = l.expireSequenceNumber;
1655 if (l.expireSequenceNumber == sequenceNum) removeRequestForFeature(netCap);
1656 }
1657 Log.d(TAG, "expireRequest with " + ourSeqNum + ", " + sequenceNum);
1658 }
1659
1660 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1661 private NetworkRequest requestNetworkForFeatureLocked(NetworkCapabilities netCap) {
1662 int delay = -1;
1663 int type = legacyTypeForNetworkCapabilities(netCap);
1664 try {
1665 delay = mService.getRestoreDefaultNetworkDelay(type);
1666 } catch (RemoteException e) {
1667 throw e.rethrowFromSystemServer();
1668 }
1669 LegacyRequest l = new LegacyRequest();
1670 l.networkCapabilities = netCap;
1671 l.delay = delay;
1672 l.expireSequenceNumber = 0;
1673 l.networkRequest = sendRequestForNetwork(
1674 netCap, l.networkCallback, 0, REQUEST, type, getDefaultHandler());
1675 if (l.networkRequest == null) return null;
1676 sLegacyRequests.put(netCap, l);
1677 sendExpireMsgForFeature(netCap, l.expireSequenceNumber, delay);
1678 return l.networkRequest;
1679 }
1680
1681 private void sendExpireMsgForFeature(NetworkCapabilities netCap, int seqNum, int delay) {
1682 if (delay >= 0) {
1683 Log.d(TAG, "sending expire msg with seqNum " + seqNum + " and delay " + delay);
1684 CallbackHandler handler = getDefaultHandler();
1685 Message msg = handler.obtainMessage(EXPIRE_LEGACY_REQUEST, seqNum, 0, netCap);
1686 handler.sendMessageDelayed(msg, delay);
1687 }
1688 }
1689
1690 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1691 private boolean removeRequestForFeature(NetworkCapabilities netCap) {
1692 final LegacyRequest l;
1693 synchronized (sLegacyRequests) {
1694 l = sLegacyRequests.remove(netCap);
1695 }
1696 if (l == null) return false;
1697 unregisterNetworkCallback(l.networkCallback);
1698 l.clearDnsBinding();
1699 return true;
1700 }
1701
1702 private static final SparseIntArray sLegacyTypeToTransport = new SparseIntArray();
1703 static {
1704 sLegacyTypeToTransport.put(TYPE_MOBILE, NetworkCapabilities.TRANSPORT_CELLULAR);
1705 sLegacyTypeToTransport.put(TYPE_MOBILE_CBS, NetworkCapabilities.TRANSPORT_CELLULAR);
1706 sLegacyTypeToTransport.put(TYPE_MOBILE_DUN, NetworkCapabilities.TRANSPORT_CELLULAR);
1707 sLegacyTypeToTransport.put(TYPE_MOBILE_FOTA, NetworkCapabilities.TRANSPORT_CELLULAR);
1708 sLegacyTypeToTransport.put(TYPE_MOBILE_HIPRI, NetworkCapabilities.TRANSPORT_CELLULAR);
1709 sLegacyTypeToTransport.put(TYPE_MOBILE_IMS, NetworkCapabilities.TRANSPORT_CELLULAR);
1710 sLegacyTypeToTransport.put(TYPE_MOBILE_MMS, NetworkCapabilities.TRANSPORT_CELLULAR);
1711 sLegacyTypeToTransport.put(TYPE_MOBILE_SUPL, NetworkCapabilities.TRANSPORT_CELLULAR);
1712 sLegacyTypeToTransport.put(TYPE_WIFI, NetworkCapabilities.TRANSPORT_WIFI);
1713 sLegacyTypeToTransport.put(TYPE_WIFI_P2P, NetworkCapabilities.TRANSPORT_WIFI);
1714 sLegacyTypeToTransport.put(TYPE_BLUETOOTH, NetworkCapabilities.TRANSPORT_BLUETOOTH);
1715 sLegacyTypeToTransport.put(TYPE_ETHERNET, NetworkCapabilities.TRANSPORT_ETHERNET);
1716 }
1717
1718 private static final SparseIntArray sLegacyTypeToCapability = new SparseIntArray();
1719 static {
1720 sLegacyTypeToCapability.put(TYPE_MOBILE_CBS, NetworkCapabilities.NET_CAPABILITY_CBS);
1721 sLegacyTypeToCapability.put(TYPE_MOBILE_DUN, NetworkCapabilities.NET_CAPABILITY_DUN);
1722 sLegacyTypeToCapability.put(TYPE_MOBILE_FOTA, NetworkCapabilities.NET_CAPABILITY_FOTA);
1723 sLegacyTypeToCapability.put(TYPE_MOBILE_IMS, NetworkCapabilities.NET_CAPABILITY_IMS);
1724 sLegacyTypeToCapability.put(TYPE_MOBILE_MMS, NetworkCapabilities.NET_CAPABILITY_MMS);
1725 sLegacyTypeToCapability.put(TYPE_MOBILE_SUPL, NetworkCapabilities.NET_CAPABILITY_SUPL);
1726 sLegacyTypeToCapability.put(TYPE_WIFI_P2P, NetworkCapabilities.NET_CAPABILITY_WIFI_P2P);
1727 }
1728
1729 /**
1730 * Given a legacy type (TYPE_WIFI, ...) returns a NetworkCapabilities
1731 * instance suitable for registering a request or callback. Throws an
1732 * IllegalArgumentException if no mapping from the legacy type to
1733 * NetworkCapabilities is known.
1734 *
1735 * @deprecated Types are deprecated. Use {@link NetworkCallback} or {@link NetworkRequest}
1736 * to find the network instead.
1737 * @hide
1738 */
1739 public static NetworkCapabilities networkCapabilitiesForType(int type) {
1740 final NetworkCapabilities nc = new NetworkCapabilities();
1741
1742 // Map from type to transports.
1743 final int NOT_FOUND = -1;
1744 final int transport = sLegacyTypeToTransport.get(type, NOT_FOUND);
Remi NGUYEN VAN3f0e7dd2021-03-15 07:27:44 +00001745 Preconditions.checkArgument(transport != NOT_FOUND, "unknown legacy type: " + type);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001746 nc.addTransportType(transport);
1747
1748 // Map from type to capabilities.
1749 nc.addCapability(sLegacyTypeToCapability.get(
1750 type, NetworkCapabilities.NET_CAPABILITY_INTERNET));
1751 nc.maybeMarkCapabilitiesRestricted();
1752 return nc;
1753 }
1754
1755 /** @hide */
1756 public static class PacketKeepaliveCallback {
1757 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1758 public PacketKeepaliveCallback() {
1759 }
1760 /** The requested keepalive was successfully started. */
1761 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1762 public void onStarted() {}
1763 /** The keepalive was successfully stopped. */
1764 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1765 public void onStopped() {}
1766 /** An error occurred. */
1767 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1768 public void onError(int error) {}
1769 }
1770
1771 /**
1772 * Allows applications to request that the system periodically send specific packets on their
1773 * behalf, using hardware offload to save battery power.
1774 *
1775 * To request that the system send keepalives, call one of the methods that return a
1776 * {@link ConnectivityManager.PacketKeepalive} object, such as {@link #startNattKeepalive},
1777 * passing in a non-null callback. If the callback is successfully started, the callback's
1778 * {@code onStarted} method will be called. If an error occurs, {@code onError} will be called,
1779 * specifying one of the {@code ERROR_*} constants in this class.
1780 *
1781 * To stop an existing keepalive, call {@link PacketKeepalive#stop}. The system will call
1782 * {@link PacketKeepaliveCallback#onStopped} if the operation was successful or
1783 * {@link PacketKeepaliveCallback#onError} if an error occurred.
1784 *
1785 * @deprecated Use {@link SocketKeepalive} instead.
1786 *
1787 * @hide
1788 */
1789 public class PacketKeepalive {
1790
1791 private static final String TAG = "PacketKeepalive";
1792
1793 /** @hide */
1794 public static final int SUCCESS = 0;
1795
1796 /** @hide */
1797 public static final int NO_KEEPALIVE = -1;
1798
1799 /** @hide */
1800 public static final int BINDER_DIED = -10;
1801
1802 /** The specified {@code Network} is not connected. */
1803 public static final int ERROR_INVALID_NETWORK = -20;
1804 /** The specified IP addresses are invalid. For example, the specified source IP address is
1805 * not configured on the specified {@code Network}. */
1806 public static final int ERROR_INVALID_IP_ADDRESS = -21;
1807 /** The requested port is invalid. */
1808 public static final int ERROR_INVALID_PORT = -22;
1809 /** The packet length is invalid (e.g., too long). */
1810 public static final int ERROR_INVALID_LENGTH = -23;
1811 /** The packet transmission interval is invalid (e.g., too short). */
1812 public static final int ERROR_INVALID_INTERVAL = -24;
1813
1814 /** The hardware does not support this request. */
1815 public static final int ERROR_HARDWARE_UNSUPPORTED = -30;
1816 /** The hardware returned an error. */
1817 public static final int ERROR_HARDWARE_ERROR = -31;
1818
1819 /** The NAT-T destination port for IPsec */
1820 public static final int NATT_PORT = 4500;
1821
1822 /** The minimum interval in seconds between keepalive packet transmissions */
1823 public static final int MIN_INTERVAL = 10;
1824
1825 private final Network mNetwork;
1826 private final ISocketKeepaliveCallback mCallback;
1827 private final ExecutorService mExecutor;
1828
1829 private volatile Integer mSlot;
1830
1831 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1832 public void stop() {
1833 try {
1834 mExecutor.execute(() -> {
1835 try {
1836 if (mSlot != null) {
1837 mService.stopKeepalive(mNetwork, mSlot);
1838 }
1839 } catch (RemoteException e) {
1840 Log.e(TAG, "Error stopping packet keepalive: ", e);
1841 throw e.rethrowFromSystemServer();
1842 }
1843 });
1844 } catch (RejectedExecutionException e) {
1845 // The internal executor has already stopped due to previous event.
1846 }
1847 }
1848
1849 private PacketKeepalive(Network network, PacketKeepaliveCallback callback) {
Remi NGUYEN VAN3f0e7dd2021-03-15 07:27:44 +00001850 Preconditions.checkNotNull(network, "network cannot be null");
1851 Preconditions.checkNotNull(callback, "callback cannot be null");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001852 mNetwork = network;
1853 mExecutor = Executors.newSingleThreadExecutor();
1854 mCallback = new ISocketKeepaliveCallback.Stub() {
1855 @Override
1856 public void onStarted(int slot) {
1857 final long token = Binder.clearCallingIdentity();
1858 try {
1859 mExecutor.execute(() -> {
1860 mSlot = slot;
1861 callback.onStarted();
1862 });
1863 } finally {
1864 Binder.restoreCallingIdentity(token);
1865 }
1866 }
1867
1868 @Override
1869 public void onStopped() {
1870 final long token = Binder.clearCallingIdentity();
1871 try {
1872 mExecutor.execute(() -> {
1873 mSlot = null;
1874 callback.onStopped();
1875 });
1876 } finally {
1877 Binder.restoreCallingIdentity(token);
1878 }
1879 mExecutor.shutdown();
1880 }
1881
1882 @Override
1883 public void onError(int error) {
1884 final long token = Binder.clearCallingIdentity();
1885 try {
1886 mExecutor.execute(() -> {
1887 mSlot = null;
1888 callback.onError(error);
1889 });
1890 } finally {
1891 Binder.restoreCallingIdentity(token);
1892 }
1893 mExecutor.shutdown();
1894 }
1895
1896 @Override
1897 public void onDataReceived() {
1898 // PacketKeepalive is only used for Nat-T keepalive and as such does not invoke
1899 // this callback when data is received.
1900 }
1901 };
1902 }
1903 }
1904
1905 /**
1906 * Starts an IPsec NAT-T keepalive packet with the specified parameters.
1907 *
1908 * @deprecated Use {@link #createSocketKeepalive} instead.
1909 *
1910 * @hide
1911 */
1912 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1913 public PacketKeepalive startNattKeepalive(
1914 Network network, int intervalSeconds, PacketKeepaliveCallback callback,
1915 InetAddress srcAddr, int srcPort, InetAddress dstAddr) {
1916 final PacketKeepalive k = new PacketKeepalive(network, callback);
1917 try {
1918 mService.startNattKeepalive(network, intervalSeconds, k.mCallback,
1919 srcAddr.getHostAddress(), srcPort, dstAddr.getHostAddress());
1920 } catch (RemoteException e) {
1921 Log.e(TAG, "Error starting packet keepalive: ", e);
1922 throw e.rethrowFromSystemServer();
1923 }
1924 return k;
1925 }
1926
1927 // Construct an invalid fd.
1928 private ParcelFileDescriptor createInvalidFd() {
1929 final int invalidFd = -1;
1930 return ParcelFileDescriptor.adoptFd(invalidFd);
1931 }
1932
1933 /**
1934 * Request that keepalives be started on a IPsec NAT-T socket.
1935 *
1936 * @param network The {@link Network} the socket is on.
1937 * @param socket The socket that needs to be kept alive.
1938 * @param source The source address of the {@link UdpEncapsulationSocket}.
1939 * @param destination The destination address of the {@link UdpEncapsulationSocket}.
1940 * @param executor The executor on which callback will be invoked. The provided {@link Executor}
1941 * must run callback sequentially, otherwise the order of callbacks cannot be
1942 * guaranteed.
1943 * @param callback A {@link SocketKeepalive.Callback}. Used for notifications about keepalive
1944 * changes. Must be extended by applications that use this API.
1945 *
1946 * @return A {@link SocketKeepalive} object that can be used to control the keepalive on the
1947 * given socket.
1948 **/
1949 public @NonNull SocketKeepalive createSocketKeepalive(@NonNull Network network,
1950 @NonNull UdpEncapsulationSocket socket,
1951 @NonNull InetAddress source,
1952 @NonNull InetAddress destination,
1953 @NonNull @CallbackExecutor Executor executor,
1954 @NonNull Callback callback) {
1955 ParcelFileDescriptor dup;
1956 try {
1957 // Dup is needed here as the pfd inside the socket is owned by the IpSecService,
1958 // which cannot be obtained by the app process.
1959 dup = ParcelFileDescriptor.dup(socket.getFileDescriptor());
1960 } catch (IOException ignored) {
1961 // Construct an invalid fd, so that if the user later calls start(), it will fail with
1962 // ERROR_INVALID_SOCKET.
1963 dup = createInvalidFd();
1964 }
1965 return new NattSocketKeepalive(mService, network, dup, socket.getResourceId(), source,
1966 destination, executor, callback);
1967 }
1968
1969 /**
1970 * Request that keepalives be started on a IPsec NAT-T socket file descriptor. Directly called
1971 * by system apps which don't use IpSecService to create {@link UdpEncapsulationSocket}.
1972 *
1973 * @param network The {@link Network} the socket is on.
1974 * @param pfd The {@link ParcelFileDescriptor} that needs to be kept alive. The provided
1975 * {@link ParcelFileDescriptor} must be bound to a port and the keepalives will be sent
1976 * from that port.
1977 * @param source The source address of the {@link UdpEncapsulationSocket}.
1978 * @param destination The destination address of the {@link UdpEncapsulationSocket}. The
1979 * keepalive packets will always be sent to port 4500 of the given {@code destination}.
1980 * @param executor The executor on which callback will be invoked. The provided {@link Executor}
1981 * must run callback sequentially, otherwise the order of callbacks cannot be
1982 * guaranteed.
1983 * @param callback A {@link SocketKeepalive.Callback}. Used for notifications about keepalive
1984 * changes. Must be extended by applications that use this API.
1985 *
1986 * @return A {@link SocketKeepalive} object that can be used to control the keepalive on the
1987 * given socket.
1988 * @hide
1989 */
1990 @SystemApi
1991 @RequiresPermission(android.Manifest.permission.PACKET_KEEPALIVE_OFFLOAD)
1992 public @NonNull SocketKeepalive createNattKeepalive(@NonNull Network network,
1993 @NonNull ParcelFileDescriptor pfd,
1994 @NonNull InetAddress source,
1995 @NonNull InetAddress destination,
1996 @NonNull @CallbackExecutor Executor executor,
1997 @NonNull Callback callback) {
1998 ParcelFileDescriptor dup;
1999 try {
2000 // TODO: Consider remove unnecessary dup.
2001 dup = pfd.dup();
2002 } catch (IOException ignored) {
2003 // Construct an invalid fd, so that if the user later calls start(), it will fail with
2004 // ERROR_INVALID_SOCKET.
2005 dup = createInvalidFd();
2006 }
2007 return new NattSocketKeepalive(mService, network, dup,
Remi NGUYEN VANa29be5c2021-03-11 10:56:49 +00002008 -1 /* Unused */, source, destination, executor, callback);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002009 }
2010
2011 /**
2012 * Request that keepalives be started on a TCP socket.
2013 * The socket must be established.
2014 *
2015 * @param network The {@link Network} the socket is on.
2016 * @param socket The socket that needs to be kept alive.
2017 * @param executor The executor on which callback will be invoked. This implementation assumes
2018 * the provided {@link Executor} runs the callbacks in sequence with no
2019 * concurrency. Failing this, no guarantee of correctness can be made. It is
2020 * the responsibility of the caller to ensure the executor provides this
2021 * guarantee. A simple way of creating such an executor is with the standard
2022 * tool {@code Executors.newSingleThreadExecutor}.
2023 * @param callback A {@link SocketKeepalive.Callback}. Used for notifications about keepalive
2024 * changes. Must be extended by applications that use this API.
2025 *
2026 * @return A {@link SocketKeepalive} object that can be used to control the keepalive on the
2027 * given socket.
2028 * @hide
2029 */
2030 @SystemApi
2031 @RequiresPermission(android.Manifest.permission.PACKET_KEEPALIVE_OFFLOAD)
2032 public @NonNull SocketKeepalive createSocketKeepalive(@NonNull Network network,
2033 @NonNull Socket socket,
2034 @NonNull Executor executor,
2035 @NonNull Callback callback) {
2036 ParcelFileDescriptor dup;
2037 try {
2038 dup = ParcelFileDescriptor.fromSocket(socket);
2039 } catch (UncheckedIOException ignored) {
2040 // Construct an invalid fd, so that if the user later calls start(), it will fail with
2041 // ERROR_INVALID_SOCKET.
2042 dup = createInvalidFd();
2043 }
2044 return new TcpSocketKeepalive(mService, network, dup, executor, callback);
2045 }
2046
2047 /**
2048 * Ensure that a network route exists to deliver traffic to the specified
2049 * host via the specified network interface. An attempt to add a route that
2050 * already exists is ignored, but treated as successful.
2051 *
2052 * <p>This method requires the caller to hold either the
2053 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2054 * or the ability to modify system settings as determined by
2055 * {@link android.provider.Settings.System#canWrite}.</p>
2056 *
2057 * @param networkType the type of the network over which traffic to the specified
2058 * host is to be routed
2059 * @param hostAddress the IP address of the host to which the route is desired
2060 * @return {@code true} on success, {@code false} on failure
2061 *
2062 * @deprecated Deprecated in favor of the
2063 * {@link #requestNetwork(NetworkRequest, NetworkCallback)},
2064 * {@link #bindProcessToNetwork} and {@link Network#getSocketFactory} API.
2065 * In {@link VERSION_CODES#M}, and above, this method is unsupported and will
2066 * throw {@code UnsupportedOperationException} if called.
2067 * @removed
2068 */
2069 @Deprecated
2070 public boolean requestRouteToHost(int networkType, int hostAddress) {
2071 return requestRouteToHostAddress(networkType, NetworkUtils.intToInetAddress(hostAddress));
2072 }
2073
2074 /**
2075 * Ensure that a network route exists to deliver traffic to the specified
2076 * host via the specified network interface. An attempt to add a route that
2077 * already exists is ignored, but treated as successful.
2078 *
2079 * <p>This method requires the caller to hold either the
2080 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2081 * or the ability to modify system settings as determined by
2082 * {@link android.provider.Settings.System#canWrite}.</p>
2083 *
2084 * @param networkType the type of the network over which traffic to the specified
2085 * host is to be routed
2086 * @param hostAddress the IP address of the host to which the route is desired
2087 * @return {@code true} on success, {@code false} on failure
2088 * @hide
2089 * @deprecated Deprecated in favor of the {@link #requestNetwork} and
2090 * {@link #bindProcessToNetwork} API.
2091 */
2092 @Deprecated
2093 @UnsupportedAppUsage
2094 public boolean requestRouteToHostAddress(int networkType, InetAddress hostAddress) {
2095 checkLegacyRoutingApiAccess();
2096 try {
2097 return mService.requestRouteToHostAddress(networkType, hostAddress.getAddress(),
2098 mContext.getOpPackageName(), getAttributionTag());
2099 } catch (RemoteException e) {
2100 throw e.rethrowFromSystemServer();
2101 }
2102 }
2103
2104 /**
2105 * @return the context's attribution tag
2106 */
2107 // TODO: Remove method and replace with direct call once R code is pushed to AOSP
2108 private @Nullable String getAttributionTag() {
Roshan Piusa8a477b2020-12-17 14:53:09 -08002109 return mContext.getAttributionTag();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002110 }
2111
2112 /**
2113 * Returns the value of the setting for background data usage. If false,
2114 * applications should not use the network if the application is not in the
2115 * foreground. Developers should respect this setting, and check the value
2116 * of this before performing any background data operations.
2117 * <p>
2118 * All applications that have background services that use the network
2119 * should listen to {@link #ACTION_BACKGROUND_DATA_SETTING_CHANGED}.
2120 * <p>
2121 * @deprecated As of {@link VERSION_CODES#ICE_CREAM_SANDWICH}, availability of
2122 * background data depends on several combined factors, and this method will
2123 * always return {@code true}. Instead, when background data is unavailable,
2124 * {@link #getActiveNetworkInfo()} will now appear disconnected.
2125 *
2126 * @return Whether background data usage is allowed.
2127 */
2128 @Deprecated
2129 public boolean getBackgroundDataSetting() {
2130 // assume that background data is allowed; final authority is
2131 // NetworkInfo which may be blocked.
2132 return true;
2133 }
2134
2135 /**
2136 * Sets the value of the setting for background data usage.
2137 *
2138 * @param allowBackgroundData Whether an application should use data while
2139 * it is in the background.
2140 *
2141 * @attr ref android.Manifest.permission#CHANGE_BACKGROUND_DATA_SETTING
2142 * @see #getBackgroundDataSetting()
2143 * @hide
2144 */
2145 @Deprecated
2146 @UnsupportedAppUsage
2147 public void setBackgroundDataSetting(boolean allowBackgroundData) {
2148 // ignored
2149 }
2150
2151 /**
2152 * @hide
2153 * @deprecated Talk to TelephonyManager directly
2154 */
2155 @Deprecated
2156 @UnsupportedAppUsage
2157 public boolean getMobileDataEnabled() {
2158 TelephonyManager tm = mContext.getSystemService(TelephonyManager.class);
2159 if (tm != null) {
2160 int subId = SubscriptionManager.getDefaultDataSubscriptionId();
2161 Log.d("ConnectivityManager", "getMobileDataEnabled()+ subId=" + subId);
2162 boolean retVal = tm.createForSubscriptionId(subId).isDataEnabled();
2163 Log.d("ConnectivityManager", "getMobileDataEnabled()- subId=" + subId
2164 + " retVal=" + retVal);
2165 return retVal;
2166 }
2167 Log.d("ConnectivityManager", "getMobileDataEnabled()- remote exception retVal=false");
2168 return false;
2169 }
2170
2171 /**
2172 * Callback for use with {@link ConnectivityManager#addDefaultNetworkActiveListener}
2173 * to find out when the system default network has gone in to a high power state.
2174 */
2175 public interface OnNetworkActiveListener {
2176 /**
2177 * Called on the main thread of the process to report that the current data network
2178 * has become active, and it is now a good time to perform any pending network
2179 * operations. Note that this listener only tells you when the network becomes
2180 * active; if at any other time you want to know whether it is active (and thus okay
2181 * to initiate network traffic), you can retrieve its instantaneous state with
2182 * {@link ConnectivityManager#isDefaultNetworkActive}.
2183 */
2184 void onNetworkActive();
2185 }
2186
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002187 private final ArrayMap<OnNetworkActiveListener, INetworkActivityListener>
2188 mNetworkActivityListeners = new ArrayMap<>();
2189
2190 /**
2191 * Start listening to reports when the system's default data network is active, meaning it is
2192 * a good time to perform network traffic. Use {@link #isDefaultNetworkActive()}
2193 * to determine the current state of the system's default network after registering the
2194 * listener.
2195 * <p>
2196 * If the process default network has been set with
2197 * {@link ConnectivityManager#bindProcessToNetwork} this function will not
2198 * reflect the process's default, but the system default.
2199 *
2200 * @param l The listener to be told when the network is active.
2201 */
2202 public void addDefaultNetworkActiveListener(final OnNetworkActiveListener l) {
2203 INetworkActivityListener rl = new INetworkActivityListener.Stub() {
2204 @Override
2205 public void onNetworkActive() throws RemoteException {
2206 l.onNetworkActive();
2207 }
2208 };
2209
2210 try {
lucaslin709eb842021-01-21 02:04:15 +08002211 mService.registerNetworkActivityListener(rl);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002212 mNetworkActivityListeners.put(l, rl);
2213 } catch (RemoteException e) {
2214 throw e.rethrowFromSystemServer();
2215 }
2216 }
2217
2218 /**
2219 * Remove network active listener previously registered with
2220 * {@link #addDefaultNetworkActiveListener}.
2221 *
2222 * @param l Previously registered listener.
2223 */
2224 public void removeDefaultNetworkActiveListener(@NonNull OnNetworkActiveListener l) {
2225 INetworkActivityListener rl = mNetworkActivityListeners.get(l);
Remi NGUYEN VAN3f0e7dd2021-03-15 07:27:44 +00002226 Preconditions.checkArgument(rl != null, "Listener was not registered.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002227 try {
lucaslin709eb842021-01-21 02:04:15 +08002228 mService.registerNetworkActivityListener(rl);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002229 } catch (RemoteException e) {
2230 throw e.rethrowFromSystemServer();
2231 }
2232 }
2233
2234 /**
2235 * Return whether the data network is currently active. An active network means that
2236 * it is currently in a high power state for performing data transmission. On some
2237 * types of networks, it may be expensive to move and stay in such a state, so it is
2238 * more power efficient to batch network traffic together when the radio is already in
2239 * this state. This method tells you whether right now is currently a good time to
2240 * initiate network traffic, as the network is already active.
2241 */
2242 public boolean isDefaultNetworkActive() {
2243 try {
lucaslin709eb842021-01-21 02:04:15 +08002244 return mService.isDefaultNetworkActive();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002245 } catch (RemoteException e) {
2246 throw e.rethrowFromSystemServer();
2247 }
2248 }
2249
2250 /**
2251 * {@hide}
2252 */
2253 public ConnectivityManager(Context context, IConnectivityManager service) {
Remi NGUYEN VAN3f0e7dd2021-03-15 07:27:44 +00002254 mContext = Preconditions.checkNotNull(context, "missing context");
2255 mService = Preconditions.checkNotNull(service, "missing IConnectivityManager");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002256 mTetheringManager = (TetheringManager) mContext.getSystemService(Context.TETHERING_SERVICE);
2257 sInstance = this;
2258 }
2259
2260 /** {@hide} */
2261 @UnsupportedAppUsage
2262 public static ConnectivityManager from(Context context) {
2263 return (ConnectivityManager) context.getSystemService(Context.CONNECTIVITY_SERVICE);
2264 }
2265
2266 /** @hide */
2267 public NetworkRequest getDefaultRequest() {
2268 try {
2269 // This is not racy as the default request is final in ConnectivityService.
2270 return mService.getDefaultRequest();
2271 } catch (RemoteException e) {
2272 throw e.rethrowFromSystemServer();
2273 }
2274 }
2275
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002276 /**
2277 * Check if the package is a allowed to write settings. This also accounts that such an access
2278 * happened.
2279 *
2280 * @return {@code true} iff the package is allowed to write settings.
2281 */
2282 // TODO: Remove method and replace with direct call once R code is pushed to AOSP
2283 private static boolean checkAndNoteWriteSettingsOperation(@NonNull Context context, int uid,
2284 @NonNull String callingPackage, @Nullable String callingAttributionTag,
2285 boolean throwException) {
2286 return Settings.checkAndNoteWriteSettingsOperation(context, uid, callingPackage,
2287 throwException);
2288 }
2289
2290 /**
2291 * @deprecated - use getSystemService. This is a kludge to support static access in certain
2292 * situations where a Context pointer is unavailable.
2293 * @hide
2294 */
2295 @Deprecated
2296 static ConnectivityManager getInstanceOrNull() {
2297 return sInstance;
2298 }
2299
2300 /**
2301 * @deprecated - use getSystemService. This is a kludge to support static access in certain
2302 * situations where a Context pointer is unavailable.
2303 * @hide
2304 */
2305 @Deprecated
2306 @UnsupportedAppUsage
2307 private static ConnectivityManager getInstance() {
2308 if (getInstanceOrNull() == null) {
2309 throw new IllegalStateException("No ConnectivityManager yet constructed");
2310 }
2311 return getInstanceOrNull();
2312 }
2313
2314 /**
2315 * Get the set of tetherable, available interfaces. This list is limited by
2316 * device configuration and current interface existence.
2317 *
2318 * @return an array of 0 or more Strings of tetherable interface names.
2319 *
2320 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfacesChanged(List)} instead.
2321 * {@hide}
2322 */
2323 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2324 @UnsupportedAppUsage
2325 @Deprecated
2326 public String[] getTetherableIfaces() {
2327 return mTetheringManager.getTetherableIfaces();
2328 }
2329
2330 /**
2331 * Get the set of tethered interfaces.
2332 *
2333 * @return an array of 0 or more String of currently tethered interface names.
2334 *
2335 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfacesChanged(List)} instead.
2336 * {@hide}
2337 */
2338 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2339 @UnsupportedAppUsage
2340 @Deprecated
2341 public String[] getTetheredIfaces() {
2342 return mTetheringManager.getTetheredIfaces();
2343 }
2344
2345 /**
2346 * Get the set of interface names which attempted to tether but
2347 * failed. Re-attempting to tether may cause them to reset to the Tethered
2348 * state. Alternatively, causing the interface to be destroyed and recreated
2349 * may cause them to reset to the available state.
2350 * {@link ConnectivityManager#getLastTetherError} can be used to get more
2351 * information on the cause of the errors.
2352 *
2353 * @return an array of 0 or more String indicating the interface names
2354 * which failed to tether.
2355 *
2356 * @deprecated Use {@link TetheringEventCallback#onError(String, int)} instead.
2357 * {@hide}
2358 */
2359 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2360 @UnsupportedAppUsage
2361 @Deprecated
2362 public String[] getTetheringErroredIfaces() {
2363 return mTetheringManager.getTetheringErroredIfaces();
2364 }
2365
2366 /**
2367 * Get the set of tethered dhcp ranges.
2368 *
2369 * @deprecated This method is not supported.
2370 * TODO: remove this function when all of clients are removed.
2371 * {@hide}
2372 */
2373 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
2374 @Deprecated
2375 public String[] getTetheredDhcpRanges() {
2376 throw new UnsupportedOperationException("getTetheredDhcpRanges is not supported");
2377 }
2378
2379 /**
2380 * Attempt to tether the named interface. This will setup a dhcp server
2381 * on the interface, forward and NAT IP packets and forward DNS requests
2382 * to the best active upstream network interface. Note that if no upstream
2383 * IP network interface is available, dhcp will still run and traffic will be
2384 * allowed between the tethered devices and this device, though upstream net
2385 * access will of course fail until an upstream network interface becomes
2386 * active.
2387 *
2388 * <p>This method requires the caller to hold either the
2389 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2390 * or the ability to modify system settings as determined by
2391 * {@link android.provider.Settings.System#canWrite}.</p>
2392 *
2393 * <p>WARNING: New clients should not use this function. The only usages should be in PanService
2394 * and WifiStateMachine which need direct access. All other clients should use
2395 * {@link #startTethering} and {@link #stopTethering} which encapsulate proper provisioning
2396 * logic.</p>
2397 *
2398 * @param iface the interface name to tether.
2399 * @return error a {@code TETHER_ERROR} value indicating success or failure type
2400 * @deprecated Use {@link TetheringManager#startTethering} instead
2401 *
2402 * {@hide}
2403 */
2404 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
2405 @Deprecated
2406 public int tether(String iface) {
2407 return mTetheringManager.tether(iface);
2408 }
2409
2410 /**
2411 * Stop tethering the named interface.
2412 *
2413 * <p>This method requires the caller to hold either the
2414 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2415 * or the ability to modify system settings as determined by
2416 * {@link android.provider.Settings.System#canWrite}.</p>
2417 *
2418 * <p>WARNING: New clients should not use this function. The only usages should be in PanService
2419 * and WifiStateMachine which need direct access. All other clients should use
2420 * {@link #startTethering} and {@link #stopTethering} which encapsulate proper provisioning
2421 * logic.</p>
2422 *
2423 * @param iface the interface name to untether.
2424 * @return error a {@code TETHER_ERROR} value indicating success or failure type
2425 *
2426 * {@hide}
2427 */
2428 @UnsupportedAppUsage
2429 @Deprecated
2430 public int untether(String iface) {
2431 return mTetheringManager.untether(iface);
2432 }
2433
2434 /**
2435 * Check if the device allows for tethering. It may be disabled via
2436 * {@code ro.tether.denied} system property, Settings.TETHER_SUPPORTED or
2437 * due to device configuration.
2438 *
2439 * <p>If this app does not have permission to use this API, it will always
2440 * return false rather than throw an exception.</p>
2441 *
2442 * <p>If the device has a hotspot provisioning app, the caller is required to hold the
2443 * {@link android.Manifest.permission.TETHER_PRIVILEGED} permission.</p>
2444 *
2445 * <p>Otherwise, this method requires the caller to hold the ability to modify system
2446 * settings as determined by {@link android.provider.Settings.System#canWrite}.</p>
2447 *
2448 * @return a boolean - {@code true} indicating Tethering is supported.
2449 *
2450 * @deprecated Use {@link TetheringEventCallback#onTetheringSupported(boolean)} instead.
2451 * {@hide}
2452 */
2453 @SystemApi
2454 @RequiresPermission(anyOf = {android.Manifest.permission.TETHER_PRIVILEGED,
2455 android.Manifest.permission.WRITE_SETTINGS})
2456 public boolean isTetheringSupported() {
2457 return mTetheringManager.isTetheringSupported();
2458 }
2459
2460 /**
2461 * Callback for use with {@link #startTethering} to find out whether tethering succeeded.
2462 *
2463 * @deprecated Use {@link TetheringManager.StartTetheringCallback} instead.
2464 * @hide
2465 */
2466 @SystemApi
2467 @Deprecated
2468 public static abstract class OnStartTetheringCallback {
2469 /**
2470 * Called when tethering has been successfully started.
2471 */
2472 public void onTetheringStarted() {}
2473
2474 /**
2475 * Called when starting tethering failed.
2476 */
2477 public void onTetheringFailed() {}
2478 }
2479
2480 /**
2481 * Convenient overload for
2482 * {@link #startTethering(int, boolean, OnStartTetheringCallback, Handler)} which passes a null
2483 * handler to run on the current thread's {@link Looper}.
2484 *
2485 * @deprecated Use {@link TetheringManager#startTethering} instead.
2486 * @hide
2487 */
2488 @SystemApi
2489 @Deprecated
2490 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2491 public void startTethering(int type, boolean showProvisioningUi,
2492 final OnStartTetheringCallback callback) {
2493 startTethering(type, showProvisioningUi, callback, null);
2494 }
2495
2496 /**
2497 * Runs tether provisioning for the given type if needed and then starts tethering if
2498 * the check succeeds. If no carrier provisioning is required for tethering, tethering is
2499 * enabled immediately. If provisioning fails, tethering will not be enabled. It also
2500 * schedules tether provisioning re-checks if appropriate.
2501 *
2502 * @param type The type of tethering to start. Must be one of
2503 * {@link ConnectivityManager.TETHERING_WIFI},
2504 * {@link ConnectivityManager.TETHERING_USB}, or
2505 * {@link ConnectivityManager.TETHERING_BLUETOOTH}.
2506 * @param showProvisioningUi a boolean indicating to show the provisioning app UI if there
2507 * is one. This should be true the first time this function is called and also any time
2508 * the user can see this UI. It gives users information from their carrier about the
2509 * check failing and how they can sign up for tethering if possible.
2510 * @param callback an {@link OnStartTetheringCallback} which will be called to notify the caller
2511 * of the result of trying to tether.
2512 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
2513 *
2514 * @deprecated Use {@link TetheringManager#startTethering} instead.
2515 * @hide
2516 */
2517 @SystemApi
2518 @Deprecated
2519 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2520 public void startTethering(int type, boolean showProvisioningUi,
2521 final OnStartTetheringCallback callback, Handler handler) {
Remi NGUYEN VAN3f0e7dd2021-03-15 07:27:44 +00002522 Preconditions.checkNotNull(callback, "OnStartTetheringCallback cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002523
2524 final Executor executor = new Executor() {
2525 @Override
2526 public void execute(Runnable command) {
2527 if (handler == null) {
2528 command.run();
2529 } else {
2530 handler.post(command);
2531 }
2532 }
2533 };
2534
2535 final StartTetheringCallback tetheringCallback = new StartTetheringCallback() {
2536 @Override
2537 public void onTetheringStarted() {
2538 callback.onTetheringStarted();
2539 }
2540
2541 @Override
2542 public void onTetheringFailed(final int error) {
2543 callback.onTetheringFailed();
2544 }
2545 };
2546
2547 final TetheringRequest request = new TetheringRequest.Builder(type)
2548 .setShouldShowEntitlementUi(showProvisioningUi).build();
2549
2550 mTetheringManager.startTethering(request, executor, tetheringCallback);
2551 }
2552
2553 /**
2554 * Stops tethering for the given type. Also cancels any provisioning rechecks for that type if
2555 * applicable.
2556 *
2557 * @param type The type of tethering to stop. Must be one of
2558 * {@link ConnectivityManager.TETHERING_WIFI},
2559 * {@link ConnectivityManager.TETHERING_USB}, or
2560 * {@link ConnectivityManager.TETHERING_BLUETOOTH}.
2561 *
2562 * @deprecated Use {@link TetheringManager#stopTethering} instead.
2563 * @hide
2564 */
2565 @SystemApi
2566 @Deprecated
2567 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2568 public void stopTethering(int type) {
2569 mTetheringManager.stopTethering(type);
2570 }
2571
2572 /**
2573 * Callback for use with {@link registerTetheringEventCallback} to find out tethering
2574 * upstream status.
2575 *
2576 * @deprecated Use {@link TetheringManager#OnTetheringEventCallback} instead.
2577 * @hide
2578 */
2579 @SystemApi
2580 @Deprecated
2581 public abstract static class OnTetheringEventCallback {
2582
2583 /**
2584 * Called when tethering upstream changed. This can be called multiple times and can be
2585 * called any time.
2586 *
2587 * @param network the {@link Network} of tethering upstream. Null means tethering doesn't
2588 * have any upstream.
2589 */
2590 public void onUpstreamChanged(@Nullable Network network) {}
2591 }
2592
2593 @GuardedBy("mTetheringEventCallbacks")
2594 private final ArrayMap<OnTetheringEventCallback, TetheringEventCallback>
2595 mTetheringEventCallbacks = new ArrayMap<>();
2596
2597 /**
2598 * Start listening to tethering change events. Any new added callback will receive the last
2599 * tethering status right away. If callback is registered when tethering has no upstream or
2600 * disabled, {@link OnTetheringEventCallback#onUpstreamChanged} will immediately be called
2601 * with a null argument. The same callback object cannot be registered twice.
2602 *
2603 * @param executor the executor on which callback will be invoked.
2604 * @param callback the callback to be called when tethering has change events.
2605 *
2606 * @deprecated Use {@link TetheringManager#registerTetheringEventCallback} instead.
2607 * @hide
2608 */
2609 @SystemApi
2610 @Deprecated
2611 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2612 public void registerTetheringEventCallback(
2613 @NonNull @CallbackExecutor Executor executor,
2614 @NonNull final OnTetheringEventCallback callback) {
Remi NGUYEN VAN3f0e7dd2021-03-15 07:27:44 +00002615 Preconditions.checkNotNull(callback, "OnTetheringEventCallback cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002616
2617 final TetheringEventCallback tetherCallback =
2618 new TetheringEventCallback() {
2619 @Override
2620 public void onUpstreamChanged(@Nullable Network network) {
2621 callback.onUpstreamChanged(network);
2622 }
2623 };
2624
2625 synchronized (mTetheringEventCallbacks) {
2626 mTetheringEventCallbacks.put(callback, tetherCallback);
2627 mTetheringManager.registerTetheringEventCallback(executor, tetherCallback);
2628 }
2629 }
2630
2631 /**
2632 * Remove tethering event callback previously registered with
2633 * {@link #registerTetheringEventCallback}.
2634 *
2635 * @param callback previously registered callback.
2636 *
2637 * @deprecated Use {@link TetheringManager#unregisterTetheringEventCallback} instead.
2638 * @hide
2639 */
2640 @SystemApi
2641 @Deprecated
2642 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2643 public void unregisterTetheringEventCallback(
2644 @NonNull final OnTetheringEventCallback callback) {
2645 Objects.requireNonNull(callback, "The callback must be non-null");
2646 synchronized (mTetheringEventCallbacks) {
2647 final TetheringEventCallback tetherCallback =
2648 mTetheringEventCallbacks.remove(callback);
2649 mTetheringManager.unregisterTetheringEventCallback(tetherCallback);
2650 }
2651 }
2652
2653
2654 /**
2655 * Get the list of regular expressions that define any tetherable
2656 * USB network interfaces. If USB tethering is not supported by the
2657 * device, this list should be empty.
2658 *
2659 * @return an array of 0 or more regular expression Strings defining
2660 * what interfaces are considered tetherable usb interfaces.
2661 *
2662 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfaceRegexpsChanged} instead.
2663 * {@hide}
2664 */
2665 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2666 @UnsupportedAppUsage
2667 @Deprecated
2668 public String[] getTetherableUsbRegexs() {
2669 return mTetheringManager.getTetherableUsbRegexs();
2670 }
2671
2672 /**
2673 * Get the list of regular expressions that define any tetherable
2674 * Wifi network interfaces. If Wifi tethering is not supported by the
2675 * device, this list should be empty.
2676 *
2677 * @return an array of 0 or more regular expression Strings defining
2678 * what interfaces are considered tetherable wifi interfaces.
2679 *
2680 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfaceRegexpsChanged} instead.
2681 * {@hide}
2682 */
2683 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2684 @UnsupportedAppUsage
2685 @Deprecated
2686 public String[] getTetherableWifiRegexs() {
2687 return mTetheringManager.getTetherableWifiRegexs();
2688 }
2689
2690 /**
2691 * Get the list of regular expressions that define any tetherable
2692 * Bluetooth network interfaces. If Bluetooth tethering is not supported by the
2693 * device, this list should be empty.
2694 *
2695 * @return an array of 0 or more regular expression Strings defining
2696 * what interfaces are considered tetherable bluetooth interfaces.
2697 *
2698 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfaceRegexpsChanged(
2699 *TetheringManager.TetheringInterfaceRegexps)} instead.
2700 * {@hide}
2701 */
2702 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2703 @UnsupportedAppUsage
2704 @Deprecated
2705 public String[] getTetherableBluetoothRegexs() {
2706 return mTetheringManager.getTetherableBluetoothRegexs();
2707 }
2708
2709 /**
2710 * Attempt to both alter the mode of USB and Tethering of USB. A
2711 * utility method to deal with some of the complexity of USB - will
2712 * attempt to switch to Rndis and subsequently tether the resulting
2713 * interface on {@code true} or turn off tethering and switch off
2714 * Rndis on {@code false}.
2715 *
2716 * <p>This method requires the caller to hold either the
2717 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2718 * or the ability to modify system settings as determined by
2719 * {@link android.provider.Settings.System#canWrite}.</p>
2720 *
2721 * @param enable a boolean - {@code true} to enable tethering
2722 * @return error a {@code TETHER_ERROR} value indicating success or failure type
2723 * @deprecated Use {@link TetheringManager#startTethering} instead
2724 *
2725 * {@hide}
2726 */
2727 @UnsupportedAppUsage
2728 @Deprecated
2729 public int setUsbTethering(boolean enable) {
2730 return mTetheringManager.setUsbTethering(enable);
2731 }
2732
2733 /**
2734 * @deprecated Use {@link TetheringManager#TETHER_ERROR_NO_ERROR}.
2735 * {@hide}
2736 */
2737 @SystemApi
2738 @Deprecated
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +09002739 public static final int TETHER_ERROR_NO_ERROR = 0;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002740 /**
2741 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNKNOWN_IFACE}.
2742 * {@hide}
2743 */
2744 @Deprecated
2745 public static final int TETHER_ERROR_UNKNOWN_IFACE =
2746 TetheringManager.TETHER_ERROR_UNKNOWN_IFACE;
2747 /**
2748 * @deprecated Use {@link TetheringManager#TETHER_ERROR_SERVICE_UNAVAIL}.
2749 * {@hide}
2750 */
2751 @Deprecated
2752 public static final int TETHER_ERROR_SERVICE_UNAVAIL =
2753 TetheringManager.TETHER_ERROR_SERVICE_UNAVAIL;
2754 /**
2755 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNSUPPORTED}.
2756 * {@hide}
2757 */
2758 @Deprecated
2759 public static final int TETHER_ERROR_UNSUPPORTED = TetheringManager.TETHER_ERROR_UNSUPPORTED;
2760 /**
2761 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNAVAIL_IFACE}.
2762 * {@hide}
2763 */
2764 @Deprecated
2765 public static final int TETHER_ERROR_UNAVAIL_IFACE =
2766 TetheringManager.TETHER_ERROR_UNAVAIL_IFACE;
2767 /**
2768 * @deprecated Use {@link TetheringManager#TETHER_ERROR_INTERNAL_ERROR}.
2769 * {@hide}
2770 */
2771 @Deprecated
2772 public static final int TETHER_ERROR_MASTER_ERROR =
2773 TetheringManager.TETHER_ERROR_INTERNAL_ERROR;
2774 /**
2775 * @deprecated Use {@link TetheringManager#TETHER_ERROR_TETHER_IFACE_ERROR}.
2776 * {@hide}
2777 */
2778 @Deprecated
2779 public static final int TETHER_ERROR_TETHER_IFACE_ERROR =
2780 TetheringManager.TETHER_ERROR_TETHER_IFACE_ERROR;
2781 /**
2782 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNTETHER_IFACE_ERROR}.
2783 * {@hide}
2784 */
2785 @Deprecated
2786 public static final int TETHER_ERROR_UNTETHER_IFACE_ERROR =
2787 TetheringManager.TETHER_ERROR_UNTETHER_IFACE_ERROR;
2788 /**
2789 * @deprecated Use {@link TetheringManager#TETHER_ERROR_ENABLE_FORWARDING_ERROR}.
2790 * {@hide}
2791 */
2792 @Deprecated
2793 public static final int TETHER_ERROR_ENABLE_NAT_ERROR =
2794 TetheringManager.TETHER_ERROR_ENABLE_FORWARDING_ERROR;
2795 /**
2796 * @deprecated Use {@link TetheringManager#TETHER_ERROR_DISABLE_FORWARDING_ERROR}.
2797 * {@hide}
2798 */
2799 @Deprecated
2800 public static final int TETHER_ERROR_DISABLE_NAT_ERROR =
2801 TetheringManager.TETHER_ERROR_DISABLE_FORWARDING_ERROR;
2802 /**
2803 * @deprecated Use {@link TetheringManager#TETHER_ERROR_IFACE_CFG_ERROR}.
2804 * {@hide}
2805 */
2806 @Deprecated
2807 public static final int TETHER_ERROR_IFACE_CFG_ERROR =
2808 TetheringManager.TETHER_ERROR_IFACE_CFG_ERROR;
2809 /**
2810 * @deprecated Use {@link TetheringManager#TETHER_ERROR_PROVISIONING_FAILED}.
2811 * {@hide}
2812 */
2813 @SystemApi
2814 @Deprecated
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +09002815 public static final int TETHER_ERROR_PROVISION_FAILED = 11;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002816 /**
2817 * @deprecated Use {@link TetheringManager#TETHER_ERROR_DHCPSERVER_ERROR}.
2818 * {@hide}
2819 */
2820 @Deprecated
2821 public static final int TETHER_ERROR_DHCPSERVER_ERROR =
2822 TetheringManager.TETHER_ERROR_DHCPSERVER_ERROR;
2823 /**
2824 * @deprecated Use {@link TetheringManager#TETHER_ERROR_ENTITLEMENT_UNKNOWN}.
2825 * {@hide}
2826 */
2827 @SystemApi
2828 @Deprecated
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +09002829 public static final int TETHER_ERROR_ENTITLEMENT_UNKONWN = 13;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002830
2831 /**
2832 * Get a more detailed error code after a Tethering or Untethering
2833 * request asynchronously failed.
2834 *
2835 * @param iface The name of the interface of interest
2836 * @return error The error code of the last error tethering or untethering the named
2837 * interface
2838 *
2839 * @deprecated Use {@link TetheringEventCallback#onError(String, int)} instead.
2840 * {@hide}
2841 */
2842 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2843 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
2844 @Deprecated
2845 public int getLastTetherError(String iface) {
2846 int error = mTetheringManager.getLastTetherError(iface);
2847 if (error == TetheringManager.TETHER_ERROR_UNKNOWN_TYPE) {
2848 // TETHER_ERROR_UNKNOWN_TYPE was introduced with TetheringManager and has never been
2849 // returned by ConnectivityManager. Convert it to the legacy TETHER_ERROR_UNKNOWN_IFACE
2850 // instead.
2851 error = TetheringManager.TETHER_ERROR_UNKNOWN_IFACE;
2852 }
2853 return error;
2854 }
2855
2856 /** @hide */
2857 @Retention(RetentionPolicy.SOURCE)
2858 @IntDef(value = {
2859 TETHER_ERROR_NO_ERROR,
2860 TETHER_ERROR_PROVISION_FAILED,
2861 TETHER_ERROR_ENTITLEMENT_UNKONWN,
2862 })
2863 public @interface EntitlementResultCode {
2864 }
2865
2866 /**
2867 * Callback for use with {@link #getLatestTetheringEntitlementResult} to find out whether
2868 * entitlement succeeded.
2869 *
2870 * @deprecated Use {@link TetheringManager#OnTetheringEntitlementResultListener} instead.
2871 * @hide
2872 */
2873 @SystemApi
2874 @Deprecated
2875 public interface OnTetheringEntitlementResultListener {
2876 /**
2877 * Called to notify entitlement result.
2878 *
2879 * @param resultCode an int value of entitlement result. It may be one of
2880 * {@link #TETHER_ERROR_NO_ERROR},
2881 * {@link #TETHER_ERROR_PROVISION_FAILED}, or
2882 * {@link #TETHER_ERROR_ENTITLEMENT_UNKONWN}.
2883 */
2884 void onTetheringEntitlementResult(@EntitlementResultCode int resultCode);
2885 }
2886
2887 /**
2888 * Get the last value of the entitlement check on this downstream. If the cached value is
2889 * {@link #TETHER_ERROR_NO_ERROR} or showEntitlementUi argument is false, it just return the
2890 * cached value. Otherwise, a UI-based entitlement check would be performed. It is not
2891 * guaranteed that the UI-based entitlement check will complete in any specific time period
2892 * and may in fact never complete. Any successful entitlement check the platform performs for
2893 * any reason will update the cached value.
2894 *
2895 * @param type the downstream type of tethering. Must be one of
2896 * {@link #TETHERING_WIFI},
2897 * {@link #TETHERING_USB}, or
2898 * {@link #TETHERING_BLUETOOTH}.
2899 * @param showEntitlementUi a boolean indicating whether to run UI-based entitlement check.
2900 * @param executor the executor on which callback will be invoked.
2901 * @param listener an {@link OnTetheringEntitlementResultListener} which will be called to
2902 * notify the caller of the result of entitlement check. The listener may be called zero
2903 * or one time.
2904 * @deprecated Use {@link TetheringManager#requestLatestTetheringEntitlementResult} instead.
2905 * {@hide}
2906 */
2907 @SystemApi
2908 @Deprecated
2909 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2910 public void getLatestTetheringEntitlementResult(int type, boolean showEntitlementUi,
2911 @NonNull @CallbackExecutor Executor executor,
2912 @NonNull final OnTetheringEntitlementResultListener listener) {
Remi NGUYEN VAN3f0e7dd2021-03-15 07:27:44 +00002913 Preconditions.checkNotNull(listener, "TetheringEntitlementResultListener cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002914 ResultReceiver wrappedListener = new ResultReceiver(null) {
2915 @Override
2916 protected void onReceiveResult(int resultCode, Bundle resultData) {
lucaslineaff72d2021-03-04 09:38:21 +08002917 final long token = Binder.clearCallingIdentity();
2918 try {
2919 executor.execute(() -> {
2920 listener.onTetheringEntitlementResult(resultCode);
2921 });
2922 } finally {
2923 Binder.restoreCallingIdentity(token);
2924 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002925 }
2926 };
2927
2928 mTetheringManager.requestLatestTetheringEntitlementResult(type, wrappedListener,
2929 showEntitlementUi);
2930 }
2931
2932 /**
2933 * Report network connectivity status. This is currently used only
2934 * to alter status bar UI.
2935 * <p>This method requires the caller to hold the permission
2936 * {@link android.Manifest.permission#STATUS_BAR}.
2937 *
2938 * @param networkType The type of network you want to report on
2939 * @param percentage The quality of the connection 0 is bad, 100 is good
2940 * @deprecated Types are deprecated. Use {@link #reportNetworkConnectivity} instead.
2941 * {@hide}
2942 */
2943 public void reportInetCondition(int networkType, int percentage) {
2944 printStackTrace();
2945 try {
2946 mService.reportInetCondition(networkType, percentage);
2947 } catch (RemoteException e) {
2948 throw e.rethrowFromSystemServer();
2949 }
2950 }
2951
2952 /**
2953 * Report a problem network to the framework. This provides a hint to the system
2954 * that there might be connectivity problems on this network and may cause
2955 * the framework to re-evaluate network connectivity and/or switch to another
2956 * network.
2957 *
2958 * @param network The {@link Network} the application was attempting to use
2959 * or {@code null} to indicate the current default network.
2960 * @deprecated Use {@link #reportNetworkConnectivity} which allows reporting both
2961 * working and non-working connectivity.
2962 */
2963 @Deprecated
2964 public void reportBadNetwork(@Nullable Network network) {
2965 printStackTrace();
2966 try {
2967 // One of these will be ignored because it matches system's current state.
2968 // The other will trigger the necessary reevaluation.
2969 mService.reportNetworkConnectivity(network, true);
2970 mService.reportNetworkConnectivity(network, false);
2971 } catch (RemoteException e) {
2972 throw e.rethrowFromSystemServer();
2973 }
2974 }
2975
2976 /**
2977 * Report to the framework whether a network has working connectivity.
2978 * This provides a hint to the system that a particular network is providing
2979 * working connectivity or not. In response the framework may re-evaluate
2980 * the network's connectivity and might take further action thereafter.
2981 *
2982 * @param network The {@link Network} the application was attempting to use
2983 * or {@code null} to indicate the current default network.
2984 * @param hasConnectivity {@code true} if the application was able to successfully access the
2985 * Internet using {@code network} or {@code false} if not.
2986 */
2987 public void reportNetworkConnectivity(@Nullable Network network, boolean hasConnectivity) {
2988 printStackTrace();
2989 try {
2990 mService.reportNetworkConnectivity(network, hasConnectivity);
2991 } catch (RemoteException e) {
2992 throw e.rethrowFromSystemServer();
2993 }
2994 }
2995
2996 /**
2997 * Set a network-independent global http proxy. This is not normally what you want
2998 * for typical HTTP proxies - they are general network dependent. However if you're
2999 * doing something unusual like general internal filtering this may be useful. On
3000 * a private network where the proxy is not accessible, you may break HTTP using this.
3001 *
3002 * @param p A {@link ProxyInfo} object defining the new global
3003 * HTTP proxy. A {@code null} value will clear the global HTTP proxy.
3004 * @hide
3005 */
3006 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
3007 public void setGlobalProxy(ProxyInfo p) {
3008 try {
3009 mService.setGlobalProxy(p);
3010 } catch (RemoteException e) {
3011 throw e.rethrowFromSystemServer();
3012 }
3013 }
3014
3015 /**
3016 * Retrieve any network-independent global HTTP proxy.
3017 *
3018 * @return {@link ProxyInfo} for the current global HTTP proxy or {@code null}
3019 * if no global HTTP proxy is set.
3020 * @hide
3021 */
3022 public ProxyInfo getGlobalProxy() {
3023 try {
3024 return mService.getGlobalProxy();
3025 } catch (RemoteException e) {
3026 throw e.rethrowFromSystemServer();
3027 }
3028 }
3029
3030 /**
3031 * Retrieve the global HTTP proxy, or if no global HTTP proxy is set, a
3032 * network-specific HTTP proxy. If {@code network} is null, the
3033 * network-specific proxy returned is the proxy of the default active
3034 * network.
3035 *
3036 * @return {@link ProxyInfo} for the current global HTTP proxy, or if no
3037 * global HTTP proxy is set, {@code ProxyInfo} for {@code network},
3038 * or when {@code network} is {@code null},
3039 * the {@code ProxyInfo} for the default active network. Returns
3040 * {@code null} when no proxy applies or the caller doesn't have
3041 * permission to use {@code network}.
3042 * @hide
3043 */
3044 public ProxyInfo getProxyForNetwork(Network network) {
3045 try {
3046 return mService.getProxyForNetwork(network);
3047 } catch (RemoteException e) {
3048 throw e.rethrowFromSystemServer();
3049 }
3050 }
3051
3052 /**
3053 * Get the current default HTTP proxy settings. If a global proxy is set it will be returned,
3054 * otherwise if this process is bound to a {@link Network} using
3055 * {@link #bindProcessToNetwork} then that {@code Network}'s proxy is returned, otherwise
3056 * the default network's proxy is returned.
3057 *
3058 * @return the {@link ProxyInfo} for the current HTTP proxy, or {@code null} if no
3059 * HTTP proxy is active.
3060 */
3061 @Nullable
3062 public ProxyInfo getDefaultProxy() {
3063 return getProxyForNetwork(getBoundNetworkForProcess());
3064 }
3065
3066 /**
3067 * Returns true if the hardware supports the given network type
3068 * else it returns false. This doesn't indicate we have coverage
3069 * or are authorized onto a network, just whether or not the
3070 * hardware supports it. For example a GSM phone without a SIM
3071 * should still return {@code true} for mobile data, but a wifi only
3072 * tablet would return {@code false}.
3073 *
3074 * @param networkType The network type we'd like to check
3075 * @return {@code true} if supported, else {@code false}
3076 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
3077 * @hide
3078 */
3079 @Deprecated
3080 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
3081 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
3082 public boolean isNetworkSupported(int networkType) {
3083 try {
3084 return mService.isNetworkSupported(networkType);
3085 } catch (RemoteException e) {
3086 throw e.rethrowFromSystemServer();
3087 }
3088 }
3089
3090 /**
3091 * Returns if the currently active data network is metered. A network is
3092 * classified as metered when the user is sensitive to heavy data usage on
3093 * that connection due to monetary costs, data limitations or
3094 * battery/performance issues. You should check this before doing large
3095 * data transfers, and warn the user or delay the operation until another
3096 * network is available.
3097 *
3098 * @return {@code true} if large transfers should be avoided, otherwise
3099 * {@code false}.
3100 */
3101 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
3102 public boolean isActiveNetworkMetered() {
3103 try {
3104 return mService.isActiveNetworkMetered();
3105 } catch (RemoteException e) {
3106 throw e.rethrowFromSystemServer();
3107 }
3108 }
3109
3110 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003111 * Set sign in error notification to visible or invisible
3112 *
3113 * @hide
3114 * @deprecated Doesn't properly deal with multiple connected networks of the same type.
3115 */
3116 @Deprecated
3117 public void setProvisioningNotificationVisible(boolean visible, int networkType,
3118 String action) {
3119 try {
3120 mService.setProvisioningNotificationVisible(visible, networkType, action);
3121 } catch (RemoteException e) {
3122 throw e.rethrowFromSystemServer();
3123 }
3124 }
3125
3126 /**
3127 * Set the value for enabling/disabling airplane mode
3128 *
3129 * @param enable whether to enable airplane mode or not
3130 *
3131 * @hide
3132 */
3133 @RequiresPermission(anyOf = {
3134 android.Manifest.permission.NETWORK_AIRPLANE_MODE,
3135 android.Manifest.permission.NETWORK_SETTINGS,
3136 android.Manifest.permission.NETWORK_SETUP_WIZARD,
3137 android.Manifest.permission.NETWORK_STACK})
3138 @SystemApi
3139 public void setAirplaneMode(boolean enable) {
3140 try {
3141 mService.setAirplaneMode(enable);
3142 } catch (RemoteException e) {
3143 throw e.rethrowFromSystemServer();
3144 }
3145 }
3146
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003147 /**
3148 * Registers the specified {@link NetworkProvider}.
3149 * Each listener must only be registered once. The listener can be unregistered with
3150 * {@link #unregisterNetworkProvider}.
3151 *
3152 * @param provider the provider to register
3153 * @return the ID of the provider. This ID must be used by the provider when registering
3154 * {@link android.net.NetworkAgent}s.
3155 * @hide
3156 */
3157 @SystemApi
3158 @RequiresPermission(anyOf = {
3159 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3160 android.Manifest.permission.NETWORK_FACTORY})
3161 public int registerNetworkProvider(@NonNull NetworkProvider provider) {
3162 if (provider.getProviderId() != NetworkProvider.ID_NONE) {
3163 throw new IllegalStateException("NetworkProviders can only be registered once");
3164 }
3165
3166 try {
3167 int providerId = mService.registerNetworkProvider(provider.getMessenger(),
3168 provider.getName());
3169 provider.setProviderId(providerId);
3170 } catch (RemoteException e) {
3171 throw e.rethrowFromSystemServer();
3172 }
3173 return provider.getProviderId();
3174 }
3175
3176 /**
3177 * Unregisters the specified NetworkProvider.
3178 *
3179 * @param provider the provider to unregister
3180 * @hide
3181 */
3182 @SystemApi
3183 @RequiresPermission(anyOf = {
3184 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3185 android.Manifest.permission.NETWORK_FACTORY})
3186 public void unregisterNetworkProvider(@NonNull NetworkProvider provider) {
3187 try {
3188 mService.unregisterNetworkProvider(provider.getMessenger());
3189 } catch (RemoteException e) {
3190 throw e.rethrowFromSystemServer();
3191 }
3192 provider.setProviderId(NetworkProvider.ID_NONE);
3193 }
3194
3195
3196 /** @hide exposed via the NetworkProvider class. */
3197 @RequiresPermission(anyOf = {
3198 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3199 android.Manifest.permission.NETWORK_FACTORY})
3200 public void declareNetworkRequestUnfulfillable(@NonNull NetworkRequest request) {
3201 try {
3202 mService.declareNetworkRequestUnfulfillable(request);
3203 } catch (RemoteException e) {
3204 throw e.rethrowFromSystemServer();
3205 }
3206 }
3207
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003208 /**
3209 * @hide
3210 * Register a NetworkAgent with ConnectivityService.
3211 * @return Network corresponding to NetworkAgent.
3212 */
3213 @RequiresPermission(anyOf = {
3214 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3215 android.Manifest.permission.NETWORK_FACTORY})
3216 public Network registerNetworkAgent(INetworkAgent na, NetworkInfo ni, LinkProperties lp,
Chalard Jeand6372722020-12-21 18:36:52 +09003217 NetworkCapabilities nc, @NonNull NetworkScore score, NetworkAgentConfig config,
3218 int providerId) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003219 try {
3220 return mService.registerNetworkAgent(na, ni, lp, nc, score, config, providerId);
3221 } catch (RemoteException e) {
3222 throw e.rethrowFromSystemServer();
3223 }
3224 }
3225
3226 /**
3227 * Base class for {@code NetworkRequest} callbacks. Used for notifications about network
3228 * changes. Should be extended by applications wanting notifications.
3229 *
3230 * A {@code NetworkCallback} is registered by calling
3231 * {@link #requestNetwork(NetworkRequest, NetworkCallback)},
3232 * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)},
3233 * or {@link #registerDefaultNetworkCallback(NetworkCallback)}. A {@code NetworkCallback} is
3234 * unregistered by calling {@link #unregisterNetworkCallback(NetworkCallback)}.
3235 * A {@code NetworkCallback} should be registered at most once at any time.
3236 * A {@code NetworkCallback} that has been unregistered can be registered again.
3237 */
3238 public static class NetworkCallback {
3239 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003240 * No flags associated with this callback.
3241 * @hide
3242 */
3243 public static final int FLAG_NONE = 0;
3244 /**
3245 * Use this flag to include any location sensitive data in {@link NetworkCapabilities} sent
3246 * via {@link #onCapabilitiesChanged(Network, NetworkCapabilities)}.
3247 * <p>
3248 * These include:
3249 * <li> Some transport info instances (retrieved via
3250 * {@link NetworkCapabilities#getTransportInfo()}) like {@link android.net.wifi.WifiInfo}
3251 * contain location sensitive information.
3252 * <li> OwnerUid (retrieved via {@link NetworkCapabilities#getOwnerUid()} is location
3253 * sensitive for wifi suggestor apps (i.e using {@link WifiNetworkSuggestion}).</li>
3254 * </p>
3255 * <p>
3256 * Note:
3257 * <li> Retrieving this location sensitive information (subject to app's location
3258 * permissions) will be noted by system. </li>
3259 * <li> Without this flag any {@link NetworkCapabilities} provided via the callback does
3260 * not include location sensitive info.
3261 * </p>
3262 */
3263 public static final int FLAG_INCLUDE_LOCATION_INFO = 1 << 0;
3264
3265 /** @hide */
3266 @Retention(RetentionPolicy.SOURCE)
3267 @IntDef(flag = true, prefix = "FLAG_", value = {
3268 FLAG_NONE,
3269 FLAG_INCLUDE_LOCATION_INFO
3270 })
3271 public @interface Flag { }
3272
3273 /**
3274 * All the valid flags for error checking.
3275 */
3276 private static final int VALID_FLAGS = FLAG_INCLUDE_LOCATION_INFO;
3277
3278 public NetworkCallback() {
3279 this(FLAG_NONE);
3280 }
3281
3282 public NetworkCallback(@Flag int flags) {
3283 Preconditions.checkArgument((flags & VALID_FLAGS) == flags);
3284 mFlags = flags;
3285 }
3286
3287 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003288 * Called when the framework connects to a new network to evaluate whether it satisfies this
3289 * request. If evaluation succeeds, this callback may be followed by an {@link #onAvailable}
3290 * callback. There is no guarantee that this new network will satisfy any requests, or that
3291 * the network will stay connected for longer than the time necessary to evaluate it.
3292 * <p>
3293 * Most applications <b>should not</b> act on this callback, and should instead use
3294 * {@link #onAvailable}. This callback is intended for use by applications that can assist
3295 * the framework in properly evaluating the network &mdash; for example, an application that
3296 * can automatically log in to a captive portal without user intervention.
3297 *
3298 * @param network The {@link Network} of the network that is being evaluated.
3299 *
3300 * @hide
3301 */
3302 public void onPreCheck(@NonNull Network network) {}
3303
3304 /**
3305 * Called when the framework connects and has declared a new network ready for use.
3306 * This callback may be called more than once if the {@link Network} that is
3307 * satisfying the request changes.
3308 *
3309 * @param network The {@link Network} of the satisfying network.
3310 * @param networkCapabilities The {@link NetworkCapabilities} of the satisfying network.
3311 * @param linkProperties The {@link LinkProperties} of the satisfying network.
3312 * @param blocked Whether access to the {@link Network} is blocked due to system policy.
3313 * @hide
3314 */
3315 public void onAvailable(@NonNull Network network,
3316 @NonNull NetworkCapabilities networkCapabilities,
3317 @NonNull LinkProperties linkProperties, boolean blocked) {
3318 // Internally only this method is called when a new network is available, and
3319 // it calls the callback in the same way and order that older versions used
3320 // to call so as not to change the behavior.
3321 onAvailable(network);
3322 if (!networkCapabilities.hasCapability(
3323 NetworkCapabilities.NET_CAPABILITY_NOT_SUSPENDED)) {
3324 onNetworkSuspended(network);
3325 }
3326 onCapabilitiesChanged(network, networkCapabilities);
3327 onLinkPropertiesChanged(network, linkProperties);
3328 onBlockedStatusChanged(network, blocked);
3329 }
3330
3331 /**
3332 * Called when the framework connects and has declared a new network ready for use.
3333 *
3334 * <p>For callbacks registered with {@link #registerNetworkCallback}, multiple networks may
3335 * be available at the same time, and onAvailable will be called for each of these as they
3336 * appear.
3337 *
3338 * <p>For callbacks registered with {@link #requestNetwork} and
3339 * {@link #registerDefaultNetworkCallback}, this means the network passed as an argument
3340 * is the new best network for this request and is now tracked by this callback ; this
3341 * callback will no longer receive method calls about other networks that may have been
3342 * passed to this method previously. The previously-best network may have disconnected, or
3343 * it may still be around and the newly-best network may simply be better.
3344 *
3345 * <p>Starting with {@link android.os.Build.VERSION_CODES#O}, this will always immediately
3346 * be followed by a call to {@link #onCapabilitiesChanged(Network, NetworkCapabilities)}
3347 * then by a call to {@link #onLinkPropertiesChanged(Network, LinkProperties)}, and a call
3348 * to {@link #onBlockedStatusChanged(Network, boolean)}.
3349 *
3350 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3351 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3352 * this callback as this is prone to race conditions (there is no guarantee the objects
3353 * returned by these methods will be current). Instead, wait for a call to
3354 * {@link #onCapabilitiesChanged(Network, NetworkCapabilities)} and
3355 * {@link #onLinkPropertiesChanged(Network, LinkProperties)} whose arguments are guaranteed
3356 * to be well-ordered with respect to other callbacks.
3357 *
3358 * @param network The {@link Network} of the satisfying network.
3359 */
3360 public void onAvailable(@NonNull Network network) {}
3361
3362 /**
3363 * Called when the network is about to be lost, typically because there are no outstanding
3364 * requests left for it. This may be paired with a {@link NetworkCallback#onAvailable} call
3365 * with the new replacement network for graceful handover. This method is not guaranteed
3366 * to be called before {@link NetworkCallback#onLost} is called, for example in case a
3367 * network is suddenly disconnected.
3368 *
3369 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3370 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3371 * this callback as this is prone to race conditions ; calling these methods while in a
3372 * callback may return an outdated or even a null object.
3373 *
3374 * @param network The {@link Network} that is about to be lost.
3375 * @param maxMsToLive The time in milliseconds the system intends to keep the network
3376 * connected for graceful handover; note that the network may still
3377 * suffer a hard loss at any time.
3378 */
3379 public void onLosing(@NonNull Network network, int maxMsToLive) {}
3380
3381 /**
3382 * Called when a network disconnects or otherwise no longer satisfies this request or
3383 * callback.
3384 *
3385 * <p>If the callback was registered with requestNetwork() or
3386 * registerDefaultNetworkCallback(), it will only be invoked against the last network
3387 * returned by onAvailable() when that network is lost and no other network satisfies
3388 * the criteria of the request.
3389 *
3390 * <p>If the callback was registered with registerNetworkCallback() it will be called for
3391 * each network which no longer satisfies the criteria of the callback.
3392 *
3393 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3394 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3395 * this callback as this is prone to race conditions ; calling these methods while in a
3396 * callback may return an outdated or even a null object.
3397 *
3398 * @param network The {@link Network} lost.
3399 */
3400 public void onLost(@NonNull Network network) {}
3401
3402 /**
3403 * Called if no network is found within the timeout time specified in
3404 * {@link #requestNetwork(NetworkRequest, NetworkCallback, int)} call or if the
3405 * requested network request cannot be fulfilled (whether or not a timeout was
3406 * specified). When this callback is invoked the associated
3407 * {@link NetworkRequest} will have already been removed and released, as if
3408 * {@link #unregisterNetworkCallback(NetworkCallback)} had been called.
3409 */
3410 public void onUnavailable() {}
3411
3412 /**
3413 * Called when the network corresponding to this request changes capabilities but still
3414 * satisfies the requested criteria.
3415 *
3416 * <p>Starting with {@link android.os.Build.VERSION_CODES#O} this method is guaranteed
3417 * to be called immediately after {@link #onAvailable}.
3418 *
3419 * <p>Do NOT call {@link #getLinkProperties(Network)} or other synchronous
3420 * ConnectivityManager methods in this callback as this is prone to race conditions :
3421 * calling these methods while in a callback may return an outdated or even a null object.
3422 *
3423 * @param network The {@link Network} whose capabilities have changed.
Roshan Piuse08bc182020-12-22 15:10:42 -08003424 * @param networkCapabilities The new {@link NetworkCapabilities} for this
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003425 * network.
3426 */
3427 public void onCapabilitiesChanged(@NonNull Network network,
3428 @NonNull NetworkCapabilities networkCapabilities) {}
3429
3430 /**
3431 * Called when the network corresponding to this request changes {@link LinkProperties}.
3432 *
3433 * <p>Starting with {@link android.os.Build.VERSION_CODES#O} this method is guaranteed
3434 * to be called immediately after {@link #onAvailable}.
3435 *
3436 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or other synchronous
3437 * ConnectivityManager methods in this callback as this is prone to race conditions :
3438 * calling these methods while in a callback may return an outdated or even a null object.
3439 *
3440 * @param network The {@link Network} whose link properties have changed.
3441 * @param linkProperties The new {@link LinkProperties} for this network.
3442 */
3443 public void onLinkPropertiesChanged(@NonNull Network network,
3444 @NonNull LinkProperties linkProperties) {}
3445
3446 /**
3447 * Called when the network the framework connected to for this request suspends data
3448 * transmission temporarily.
3449 *
3450 * <p>This generally means that while the TCP connections are still live temporarily
3451 * network data fails to transfer. To give a specific example, this is used on cellular
3452 * networks to mask temporary outages when driving through a tunnel, etc. In general this
3453 * means read operations on sockets on this network will block once the buffers are
3454 * drained, and write operations will block once the buffers are full.
3455 *
3456 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3457 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3458 * this callback as this is prone to race conditions (there is no guarantee the objects
3459 * returned by these methods will be current).
3460 *
3461 * @hide
3462 */
3463 public void onNetworkSuspended(@NonNull Network network) {}
3464
3465 /**
3466 * Called when the network the framework connected to for this request
3467 * returns from a {@link NetworkInfo.State#SUSPENDED} state. This should always be
3468 * preceded by a matching {@link NetworkCallback#onNetworkSuspended} call.
3469
3470 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3471 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3472 * this callback as this is prone to race conditions : calling these methods while in a
3473 * callback may return an outdated or even a null object.
3474 *
3475 * @hide
3476 */
3477 public void onNetworkResumed(@NonNull Network network) {}
3478
3479 /**
3480 * Called when access to the specified network is blocked or unblocked.
3481 *
3482 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3483 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3484 * this callback as this is prone to race conditions : calling these methods while in a
3485 * callback may return an outdated or even a null object.
3486 *
3487 * @param network The {@link Network} whose blocked status has changed.
3488 * @param blocked The blocked status of this {@link Network}.
3489 */
3490 public void onBlockedStatusChanged(@NonNull Network network, boolean blocked) {}
3491
3492 private NetworkRequest networkRequest;
Roshan Piuse08bc182020-12-22 15:10:42 -08003493 private final int mFlags;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003494 }
3495
3496 /**
3497 * Constant error codes used by ConnectivityService to communicate about failures and errors
3498 * across a Binder boundary.
3499 * @hide
3500 */
3501 public interface Errors {
3502 int TOO_MANY_REQUESTS = 1;
3503 }
3504
3505 /** @hide */
3506 public static class TooManyRequestsException extends RuntimeException {}
3507
3508 private static RuntimeException convertServiceException(ServiceSpecificException e) {
3509 switch (e.errorCode) {
3510 case Errors.TOO_MANY_REQUESTS:
3511 return new TooManyRequestsException();
3512 default:
3513 Log.w(TAG, "Unknown service error code " + e.errorCode);
3514 return new RuntimeException(e);
3515 }
3516 }
3517
3518 private static final int BASE = Protocol.BASE_CONNECTIVITY_MANAGER;
3519 /** @hide */
3520 public static final int CALLBACK_PRECHECK = BASE + 1;
3521 /** @hide */
3522 public static final int CALLBACK_AVAILABLE = BASE + 2;
3523 /** @hide arg1 = TTL */
3524 public static final int CALLBACK_LOSING = BASE + 3;
3525 /** @hide */
3526 public static final int CALLBACK_LOST = BASE + 4;
3527 /** @hide */
3528 public static final int CALLBACK_UNAVAIL = BASE + 5;
3529 /** @hide */
3530 public static final int CALLBACK_CAP_CHANGED = BASE + 6;
3531 /** @hide */
3532 public static final int CALLBACK_IP_CHANGED = BASE + 7;
3533 /** @hide obj = NetworkCapabilities, arg1 = seq number */
3534 private static final int EXPIRE_LEGACY_REQUEST = BASE + 8;
3535 /** @hide */
3536 public static final int CALLBACK_SUSPENDED = BASE + 9;
3537 /** @hide */
3538 public static final int CALLBACK_RESUMED = BASE + 10;
3539 /** @hide */
3540 public static final int CALLBACK_BLK_CHANGED = BASE + 11;
3541
3542 /** @hide */
3543 public static String getCallbackName(int whichCallback) {
3544 switch (whichCallback) {
3545 case CALLBACK_PRECHECK: return "CALLBACK_PRECHECK";
3546 case CALLBACK_AVAILABLE: return "CALLBACK_AVAILABLE";
3547 case CALLBACK_LOSING: return "CALLBACK_LOSING";
3548 case CALLBACK_LOST: return "CALLBACK_LOST";
3549 case CALLBACK_UNAVAIL: return "CALLBACK_UNAVAIL";
3550 case CALLBACK_CAP_CHANGED: return "CALLBACK_CAP_CHANGED";
3551 case CALLBACK_IP_CHANGED: return "CALLBACK_IP_CHANGED";
3552 case EXPIRE_LEGACY_REQUEST: return "EXPIRE_LEGACY_REQUEST";
3553 case CALLBACK_SUSPENDED: return "CALLBACK_SUSPENDED";
3554 case CALLBACK_RESUMED: return "CALLBACK_RESUMED";
3555 case CALLBACK_BLK_CHANGED: return "CALLBACK_BLK_CHANGED";
3556 default:
3557 return Integer.toString(whichCallback);
3558 }
3559 }
3560
3561 private class CallbackHandler extends Handler {
3562 private static final String TAG = "ConnectivityManager.CallbackHandler";
3563 private static final boolean DBG = false;
3564
3565 CallbackHandler(Looper looper) {
3566 super(looper);
3567 }
3568
3569 CallbackHandler(Handler handler) {
Remi NGUYEN VAN3f0e7dd2021-03-15 07:27:44 +00003570 this(Preconditions.checkNotNull(handler, "Handler cannot be null.").getLooper());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003571 }
3572
3573 @Override
3574 public void handleMessage(Message message) {
3575 if (message.what == EXPIRE_LEGACY_REQUEST) {
3576 expireRequest((NetworkCapabilities) message.obj, message.arg1);
3577 return;
3578 }
3579
3580 final NetworkRequest request = getObject(message, NetworkRequest.class);
3581 final Network network = getObject(message, Network.class);
3582 final NetworkCallback callback;
3583 synchronized (sCallbacks) {
3584 callback = sCallbacks.get(request);
3585 if (callback == null) {
3586 Log.w(TAG,
3587 "callback not found for " + getCallbackName(message.what) + " message");
3588 return;
3589 }
3590 if (message.what == CALLBACK_UNAVAIL) {
3591 sCallbacks.remove(request);
3592 callback.networkRequest = ALREADY_UNREGISTERED;
3593 }
3594 }
3595 if (DBG) {
3596 Log.d(TAG, getCallbackName(message.what) + " for network " + network);
3597 }
3598
3599 switch (message.what) {
3600 case CALLBACK_PRECHECK: {
3601 callback.onPreCheck(network);
3602 break;
3603 }
3604 case CALLBACK_AVAILABLE: {
3605 NetworkCapabilities cap = getObject(message, NetworkCapabilities.class);
3606 LinkProperties lp = getObject(message, LinkProperties.class);
3607 callback.onAvailable(network, cap, lp, message.arg1 != 0);
3608 break;
3609 }
3610 case CALLBACK_LOSING: {
3611 callback.onLosing(network, message.arg1);
3612 break;
3613 }
3614 case CALLBACK_LOST: {
3615 callback.onLost(network);
3616 break;
3617 }
3618 case CALLBACK_UNAVAIL: {
3619 callback.onUnavailable();
3620 break;
3621 }
3622 case CALLBACK_CAP_CHANGED: {
3623 NetworkCapabilities cap = getObject(message, NetworkCapabilities.class);
3624 callback.onCapabilitiesChanged(network, cap);
3625 break;
3626 }
3627 case CALLBACK_IP_CHANGED: {
3628 LinkProperties lp = getObject(message, LinkProperties.class);
3629 callback.onLinkPropertiesChanged(network, lp);
3630 break;
3631 }
3632 case CALLBACK_SUSPENDED: {
3633 callback.onNetworkSuspended(network);
3634 break;
3635 }
3636 case CALLBACK_RESUMED: {
3637 callback.onNetworkResumed(network);
3638 break;
3639 }
3640 case CALLBACK_BLK_CHANGED: {
3641 boolean blocked = message.arg1 != 0;
3642 callback.onBlockedStatusChanged(network, blocked);
3643 }
3644 }
3645 }
3646
3647 private <T> T getObject(Message msg, Class<T> c) {
3648 return (T) msg.getData().getParcelable(c.getSimpleName());
3649 }
3650 }
3651
3652 private CallbackHandler getDefaultHandler() {
3653 synchronized (sCallbacks) {
3654 if (sCallbackHandler == null) {
3655 sCallbackHandler = new CallbackHandler(ConnectivityThread.getInstanceLooper());
3656 }
3657 return sCallbackHandler;
3658 }
3659 }
3660
3661 private static final HashMap<NetworkRequest, NetworkCallback> sCallbacks = new HashMap<>();
3662 private static CallbackHandler sCallbackHandler;
3663
3664 private NetworkRequest sendRequestForNetwork(NetworkCapabilities need, NetworkCallback callback,
3665 int timeoutMs, NetworkRequest.Type reqType, int legacyType, CallbackHandler handler) {
3666 printStackTrace();
3667 checkCallbackNotNull(callback);
Remi NGUYEN VAN3f0e7dd2021-03-15 07:27:44 +00003668 Preconditions.checkArgument(
3669 reqType == TRACK_DEFAULT || reqType == TRACK_SYSTEM_DEFAULT || need != null,
3670 "null NetworkCapabilities");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003671 final NetworkRequest request;
3672 final String callingPackageName = mContext.getOpPackageName();
3673 try {
3674 synchronized(sCallbacks) {
3675 if (callback.networkRequest != null
3676 && callback.networkRequest != ALREADY_UNREGISTERED) {
3677 // TODO: throw exception instead and enforce 1:1 mapping of callbacks
3678 // and requests (http://b/20701525).
3679 Log.e(TAG, "NetworkCallback was already registered");
3680 }
3681 Messenger messenger = new Messenger(handler);
3682 Binder binder = new Binder();
Roshan Piuse08bc182020-12-22 15:10:42 -08003683 final int callbackFlags = callback.mFlags;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003684 if (reqType == LISTEN) {
3685 request = mService.listenForNetwork(
Roshan Piuse08bc182020-12-22 15:10:42 -08003686 need, messenger, binder, callbackFlags, callingPackageName,
Roshan Piusa8a477b2020-12-17 14:53:09 -08003687 getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003688 } else {
3689 request = mService.requestNetwork(
3690 need, reqType.ordinal(), messenger, timeoutMs, binder, legacyType,
Roshan Piuse08bc182020-12-22 15:10:42 -08003691 callbackFlags, callingPackageName, getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003692 }
3693 if (request != null) {
3694 sCallbacks.put(request, callback);
3695 }
3696 callback.networkRequest = request;
3697 }
3698 } catch (RemoteException e) {
3699 throw e.rethrowFromSystemServer();
3700 } catch (ServiceSpecificException e) {
3701 throw convertServiceException(e);
3702 }
3703 return request;
3704 }
3705
3706 /**
3707 * Helper function to request a network with a particular legacy type.
3708 *
3709 * This API is only for use in internal system code that requests networks with legacy type and
3710 * relies on CONNECTIVITY_ACTION broadcasts instead of NetworkCallbacks. New caller should use
3711 * {@link #requestNetwork(NetworkRequest, NetworkCallback, Handler)} instead.
3712 *
3713 * @param request {@link NetworkRequest} describing this request.
3714 * @param timeoutMs The time in milliseconds to attempt looking for a suitable network
3715 * before {@link NetworkCallback#onUnavailable()} is called. The timeout must
3716 * be a positive value (i.e. >0).
3717 * @param legacyType to specify the network type(#TYPE_*).
3718 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
3719 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3720 * the callback must not be shared - it uniquely specifies this request.
3721 *
3722 * @hide
3723 */
3724 @SystemApi
3725 @RequiresPermission(NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK)
3726 public void requestNetwork(@NonNull NetworkRequest request,
3727 int timeoutMs, int legacyType, @NonNull Handler handler,
3728 @NonNull NetworkCallback networkCallback) {
3729 if (legacyType == TYPE_NONE) {
3730 throw new IllegalArgumentException("TYPE_NONE is meaningless legacy type");
3731 }
3732 CallbackHandler cbHandler = new CallbackHandler(handler);
3733 NetworkCapabilities nc = request.networkCapabilities;
3734 sendRequestForNetwork(nc, networkCallback, timeoutMs, REQUEST, legacyType, cbHandler);
3735 }
3736
3737 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003738 * Request a network to satisfy a set of {@link NetworkCapabilities}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003739 *
3740 * <p>This method will attempt to find the best network that matches the passed
3741 * {@link NetworkRequest}, and to bring up one that does if none currently satisfies the
3742 * criteria. The platform will evaluate which network is the best at its own discretion.
3743 * Throughput, latency, cost per byte, policy, user preference and other considerations
3744 * may be factored in the decision of what is considered the best network.
3745 *
3746 * <p>As long as this request is outstanding, the platform will try to maintain the best network
3747 * matching this request, while always attempting to match the request to a better network if
3748 * possible. If a better match is found, the platform will switch this request to the now-best
3749 * network and inform the app of the newly best network by invoking
3750 * {@link NetworkCallback#onAvailable(Network)} on the provided callback. Note that the platform
3751 * will not try to maintain any other network than the best one currently matching the request:
3752 * a network not matching any network request may be disconnected at any time.
3753 *
3754 * <p>For example, an application could use this method to obtain a connected cellular network
3755 * even if the device currently has a data connection over Ethernet. This may cause the cellular
3756 * radio to consume additional power. Or, an application could inform the system that it wants
3757 * a network supporting sending MMSes and have the system let it know about the currently best
3758 * MMS-supporting network through the provided {@link NetworkCallback}.
3759 *
3760 * <p>The status of the request can be followed by listening to the various callbacks described
3761 * in {@link NetworkCallback}. The {@link Network} object passed to the callback methods can be
3762 * used to direct traffic to the network (although accessing some networks may be subject to
3763 * holding specific permissions). Callers will learn about the specific characteristics of the
3764 * network through
3765 * {@link NetworkCallback#onCapabilitiesChanged(Network, NetworkCapabilities)} and
3766 * {@link NetworkCallback#onLinkPropertiesChanged(Network, LinkProperties)}. The methods of the
3767 * provided {@link NetworkCallback} will only be invoked due to changes in the best network
3768 * matching the request at any given time; therefore when a better network matching the request
3769 * becomes available, the {@link NetworkCallback#onAvailable(Network)} method is called
3770 * with the new network after which no further updates are given about the previously-best
3771 * network, unless it becomes the best again at some later time. All callbacks are invoked
3772 * in order on the same thread, which by default is a thread created by the framework running
3773 * in the app.
3774 * {@see #requestNetwork(NetworkRequest, NetworkCallback, Handler)} to change where the
3775 * callbacks are invoked.
3776 *
3777 * <p>This{@link NetworkRequest} will live until released via
3778 * {@link #unregisterNetworkCallback(NetworkCallback)} or the calling application exits, at
3779 * which point the system may let go of the network at any time.
3780 *
3781 * <p>A version of this method which takes a timeout is
3782 * {@link #requestNetwork(NetworkRequest, NetworkCallback, int)}, that an app can use to only
3783 * wait for a limited amount of time for the network to become unavailable.
3784 *
3785 * <p>It is presently unsupported to request a network with mutable
3786 * {@link NetworkCapabilities} such as
3787 * {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
3788 * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}
3789 * as these {@code NetworkCapabilities} represent states that a particular
3790 * network may never attain, and whether a network will attain these states
3791 * is unknown prior to bringing up the network so the framework does not
3792 * know how to go about satisfying a request with these capabilities.
3793 *
3794 * <p>This method requires the caller to hold either the
3795 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
3796 * or the ability to modify system settings as determined by
3797 * {@link android.provider.Settings.System#canWrite}.</p>
3798 *
3799 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
3800 * number of outstanding requests to 100 per app (identified by their UID), shared with
3801 * all variants of this method, of {@link #registerNetworkCallback} as well as
3802 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
3803 * Requesting a network with this method will count toward this limit. If this limit is
3804 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
3805 * make sure to unregister the callbacks with
3806 * {@link #unregisterNetworkCallback(NetworkCallback)}.
3807 *
3808 * @param request {@link NetworkRequest} describing this request.
3809 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3810 * the callback must not be shared - it uniquely specifies this request.
3811 * The callback is invoked on the default internal Handler.
3812 * @throws IllegalArgumentException if {@code request} contains invalid network capabilities.
3813 * @throws SecurityException if missing the appropriate permissions.
3814 * @throws RuntimeException if the app already has too many callbacks registered.
3815 */
3816 public void requestNetwork(@NonNull NetworkRequest request,
3817 @NonNull NetworkCallback networkCallback) {
3818 requestNetwork(request, networkCallback, getDefaultHandler());
3819 }
3820
3821 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003822 * Request a network to satisfy a set of {@link NetworkCapabilities}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003823 *
3824 * This method behaves identically to {@link #requestNetwork(NetworkRequest, NetworkCallback)}
3825 * but runs all the callbacks on the passed Handler.
3826 *
3827 * <p>This method has the same permission requirements as
3828 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, is subject to the same limitations,
3829 * and throws the same exceptions in the same conditions.
3830 *
3831 * @param request {@link NetworkRequest} describing this request.
3832 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3833 * the callback must not be shared - it uniquely specifies this request.
3834 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
3835 */
3836 public void requestNetwork(@NonNull NetworkRequest request,
3837 @NonNull NetworkCallback networkCallback, @NonNull Handler handler) {
3838 CallbackHandler cbHandler = new CallbackHandler(handler);
3839 NetworkCapabilities nc = request.networkCapabilities;
3840 sendRequestForNetwork(nc, networkCallback, 0, REQUEST, TYPE_NONE, cbHandler);
3841 }
3842
3843 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003844 * Request a network to satisfy a set of {@link NetworkCapabilities}, limited
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003845 * by a timeout.
3846 *
3847 * This function behaves identically to the non-timed-out version
3848 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, but if a suitable network
3849 * is not found within the given time (in milliseconds) the
3850 * {@link NetworkCallback#onUnavailable()} callback is called. The request can still be
3851 * released normally by calling {@link #unregisterNetworkCallback(NetworkCallback)} but does
3852 * not have to be released if timed-out (it is automatically released). Unregistering a
3853 * request that timed out is not an error.
3854 *
3855 * <p>Do not use this method to poll for the existence of specific networks (e.g. with a small
3856 * timeout) - {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} is provided
3857 * for that purpose. Calling this method will attempt to bring up the requested network.
3858 *
3859 * <p>This method has the same permission requirements as
3860 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, is subject to the same limitations,
3861 * and throws the same exceptions in the same conditions.
3862 *
3863 * @param request {@link NetworkRequest} describing this request.
3864 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3865 * the callback must not be shared - it uniquely specifies this request.
3866 * @param timeoutMs The time in milliseconds to attempt looking for a suitable network
3867 * before {@link NetworkCallback#onUnavailable()} is called. The timeout must
3868 * be a positive value (i.e. >0).
3869 */
3870 public void requestNetwork(@NonNull NetworkRequest request,
3871 @NonNull NetworkCallback networkCallback, int timeoutMs) {
3872 checkTimeout(timeoutMs);
3873 NetworkCapabilities nc = request.networkCapabilities;
3874 sendRequestForNetwork(nc, networkCallback, timeoutMs, REQUEST, TYPE_NONE,
3875 getDefaultHandler());
3876 }
3877
3878 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003879 * Request a network to satisfy a set of {@link NetworkCapabilities}, limited
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003880 * by a timeout.
3881 *
3882 * This method behaves identically to
3883 * {@link #requestNetwork(NetworkRequest, NetworkCallback, int)} but runs all the callbacks
3884 * on the passed Handler.
3885 *
3886 * <p>This method has the same permission requirements as
3887 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, is subject to the same limitations,
3888 * and throws the same exceptions in the same conditions.
3889 *
3890 * @param request {@link NetworkRequest} describing this request.
3891 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3892 * the callback must not be shared - it uniquely specifies this request.
3893 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
3894 * @param timeoutMs The time in milliseconds to attempt looking for a suitable network
3895 * before {@link NetworkCallback#onUnavailable} is called.
3896 */
3897 public void requestNetwork(@NonNull NetworkRequest request,
3898 @NonNull NetworkCallback networkCallback, @NonNull Handler handler, int timeoutMs) {
3899 checkTimeout(timeoutMs);
3900 CallbackHandler cbHandler = new CallbackHandler(handler);
3901 NetworkCapabilities nc = request.networkCapabilities;
3902 sendRequestForNetwork(nc, networkCallback, timeoutMs, REQUEST, TYPE_NONE, cbHandler);
3903 }
3904
3905 /**
3906 * The lookup key for a {@link Network} object included with the intent after
3907 * successfully finding a network for the applications request. Retrieve it with
3908 * {@link android.content.Intent#getParcelableExtra(String)}.
3909 * <p>
3910 * Note that if you intend to invoke {@link Network#openConnection(java.net.URL)}
3911 * then you must get a ConnectivityManager instance before doing so.
3912 */
3913 public static final String EXTRA_NETWORK = "android.net.extra.NETWORK";
3914
3915 /**
3916 * The lookup key for a {@link NetworkRequest} object included with the intent after
3917 * successfully finding a network for the applications request. Retrieve it with
3918 * {@link android.content.Intent#getParcelableExtra(String)}.
3919 */
3920 public static final String EXTRA_NETWORK_REQUEST = "android.net.extra.NETWORK_REQUEST";
3921
3922
3923 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003924 * Request a network to satisfy a set of {@link NetworkCapabilities}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003925 *
3926 * This function behaves identically to the version that takes a NetworkCallback, but instead
3927 * of {@link NetworkCallback} a {@link PendingIntent} is used. This means
3928 * the request may outlive the calling application and get called back when a suitable
3929 * network is found.
3930 * <p>
3931 * The operation is an Intent broadcast that goes to a broadcast receiver that
3932 * you registered with {@link Context#registerReceiver} or through the
3933 * &lt;receiver&gt; tag in an AndroidManifest.xml file
3934 * <p>
3935 * The operation Intent is delivered with two extras, a {@link Network} typed
3936 * extra called {@link #EXTRA_NETWORK} and a {@link NetworkRequest}
3937 * typed extra called {@link #EXTRA_NETWORK_REQUEST} containing
3938 * the original requests parameters. It is important to create a new,
3939 * {@link NetworkCallback} based request before completing the processing of the
3940 * Intent to reserve the network or it will be released shortly after the Intent
3941 * is processed.
3942 * <p>
3943 * If there is already a request for this Intent registered (with the equality of
3944 * two Intents defined by {@link Intent#filterEquals}), then it will be removed and
3945 * replaced by this one, effectively releasing the previous {@link NetworkRequest}.
3946 * <p>
3947 * The request may be released normally by calling
3948 * {@link #releaseNetworkRequest(android.app.PendingIntent)}.
3949 * <p>It is presently unsupported to request a network with either
3950 * {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
3951 * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}
3952 * as these {@code NetworkCapabilities} represent states that a particular
3953 * network may never attain, and whether a network will attain these states
3954 * is unknown prior to bringing up the network so the framework does not
3955 * know how to go about satisfying a request with these capabilities.
3956 *
3957 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
3958 * number of outstanding requests to 100 per app (identified by their UID), shared with
3959 * all variants of this method, of {@link #registerNetworkCallback} as well as
3960 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
3961 * Requesting a network with this method will count toward this limit. If this limit is
3962 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
3963 * make sure to unregister the callbacks with {@link #unregisterNetworkCallback(PendingIntent)}
3964 * or {@link #releaseNetworkRequest(PendingIntent)}.
3965 *
3966 * <p>This method requires the caller to hold either the
3967 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
3968 * or the ability to modify system settings as determined by
3969 * {@link android.provider.Settings.System#canWrite}.</p>
3970 *
3971 * @param request {@link NetworkRequest} describing this request.
3972 * @param operation Action to perform when the network is available (corresponds
3973 * to the {@link NetworkCallback#onAvailable} call. Typically
3974 * comes from {@link PendingIntent#getBroadcast}. Cannot be null.
3975 * @throws IllegalArgumentException if {@code request} contains invalid network capabilities.
3976 * @throws SecurityException if missing the appropriate permissions.
3977 * @throws RuntimeException if the app already has too many callbacks registered.
3978 */
3979 public void requestNetwork(@NonNull NetworkRequest request,
3980 @NonNull PendingIntent operation) {
3981 printStackTrace();
3982 checkPendingIntentNotNull(operation);
3983 try {
3984 mService.pendingRequestForNetwork(
3985 request.networkCapabilities, operation, mContext.getOpPackageName(),
3986 getAttributionTag());
3987 } catch (RemoteException e) {
3988 throw e.rethrowFromSystemServer();
3989 } catch (ServiceSpecificException e) {
3990 throw convertServiceException(e);
3991 }
3992 }
3993
3994 /**
3995 * Removes a request made via {@link #requestNetwork(NetworkRequest, android.app.PendingIntent)}
3996 * <p>
3997 * This method has the same behavior as
3998 * {@link #unregisterNetworkCallback(android.app.PendingIntent)} with respect to
3999 * releasing network resources and disconnecting.
4000 *
4001 * @param operation A PendingIntent equal (as defined by {@link Intent#filterEquals}) to the
4002 * PendingIntent passed to
4003 * {@link #requestNetwork(NetworkRequest, android.app.PendingIntent)} with the
4004 * corresponding NetworkRequest you'd like to remove. Cannot be null.
4005 */
4006 public void releaseNetworkRequest(@NonNull PendingIntent operation) {
4007 printStackTrace();
4008 checkPendingIntentNotNull(operation);
4009 try {
4010 mService.releasePendingNetworkRequest(operation);
4011 } catch (RemoteException e) {
4012 throw e.rethrowFromSystemServer();
4013 }
4014 }
4015
4016 private static void checkPendingIntentNotNull(PendingIntent intent) {
Remi NGUYEN VAN3f0e7dd2021-03-15 07:27:44 +00004017 Preconditions.checkNotNull(intent, "PendingIntent cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004018 }
4019
4020 private static void checkCallbackNotNull(NetworkCallback callback) {
Remi NGUYEN VAN3f0e7dd2021-03-15 07:27:44 +00004021 Preconditions.checkNotNull(callback, "null NetworkCallback");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004022 }
4023
4024 private static void checkTimeout(int timeoutMs) {
Remi NGUYEN VAN3f0e7dd2021-03-15 07:27:44 +00004025 Preconditions.checkArgumentPositive(timeoutMs, "timeoutMs must be strictly positive.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004026 }
4027
4028 /**
4029 * Registers to receive notifications about all networks which satisfy the given
4030 * {@link NetworkRequest}. The callbacks will continue to be called until
4031 * either the application exits or {@link #unregisterNetworkCallback(NetworkCallback)} is
4032 * called.
4033 *
4034 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4035 * number of outstanding requests to 100 per app (identified by their UID), shared with
4036 * all variants of this method, of {@link #requestNetwork} as well as
4037 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4038 * Requesting a network with this method will count toward this limit. If this limit is
4039 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4040 * make sure to unregister the callbacks with
4041 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4042 *
4043 * @param request {@link NetworkRequest} describing this request.
4044 * @param networkCallback The {@link NetworkCallback} that the system will call as suitable
4045 * networks change state.
4046 * The callback is invoked on the default internal Handler.
4047 * @throws RuntimeException if the app already has too many callbacks registered.
4048 */
4049 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4050 public void registerNetworkCallback(@NonNull NetworkRequest request,
4051 @NonNull NetworkCallback networkCallback) {
4052 registerNetworkCallback(request, networkCallback, getDefaultHandler());
4053 }
4054
4055 /**
4056 * Registers to receive notifications about all networks which satisfy the given
4057 * {@link NetworkRequest}. The callbacks will continue to be called until
4058 * either the application exits or {@link #unregisterNetworkCallback(NetworkCallback)} is
4059 * called.
4060 *
4061 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4062 * number of outstanding requests to 100 per app (identified by their UID), shared with
4063 * all variants of this method, of {@link #requestNetwork} as well as
4064 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4065 * Requesting a network with this method will count toward this limit. If this limit is
4066 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4067 * make sure to unregister the callbacks with
4068 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4069 *
4070 *
4071 * @param request {@link NetworkRequest} describing this request.
4072 * @param networkCallback The {@link NetworkCallback} that the system will call as suitable
4073 * networks change state.
4074 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4075 * @throws RuntimeException if the app already has too many callbacks registered.
4076 */
4077 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4078 public void registerNetworkCallback(@NonNull NetworkRequest request,
4079 @NonNull NetworkCallback networkCallback, @NonNull Handler handler) {
4080 CallbackHandler cbHandler = new CallbackHandler(handler);
4081 NetworkCapabilities nc = request.networkCapabilities;
4082 sendRequestForNetwork(nc, networkCallback, 0, LISTEN, TYPE_NONE, cbHandler);
4083 }
4084
4085 /**
4086 * Registers a PendingIntent to be sent when a network is available which satisfies the given
4087 * {@link NetworkRequest}.
4088 *
4089 * This function behaves identically to the version that takes a NetworkCallback, but instead
4090 * of {@link NetworkCallback} a {@link PendingIntent} is used. This means
4091 * the request may outlive the calling application and get called back when a suitable
4092 * network is found.
4093 * <p>
4094 * The operation is an Intent broadcast that goes to a broadcast receiver that
4095 * you registered with {@link Context#registerReceiver} or through the
4096 * &lt;receiver&gt; tag in an AndroidManifest.xml file
4097 * <p>
4098 * The operation Intent is delivered with two extras, a {@link Network} typed
4099 * extra called {@link #EXTRA_NETWORK} and a {@link NetworkRequest}
4100 * typed extra called {@link #EXTRA_NETWORK_REQUEST} containing
4101 * the original requests parameters.
4102 * <p>
4103 * If there is already a request for this Intent registered (with the equality of
4104 * two Intents defined by {@link Intent#filterEquals}), then it will be removed and
4105 * replaced by this one, effectively releasing the previous {@link NetworkRequest}.
4106 * <p>
4107 * The request may be released normally by calling
4108 * {@link #unregisterNetworkCallback(android.app.PendingIntent)}.
4109 *
4110 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4111 * number of outstanding requests to 100 per app (identified by their UID), shared with
4112 * all variants of this method, of {@link #requestNetwork} as well as
4113 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4114 * Requesting a network with this method will count toward this limit. If this limit is
4115 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4116 * make sure to unregister the callbacks with {@link #unregisterNetworkCallback(PendingIntent)}
4117 * or {@link #releaseNetworkRequest(PendingIntent)}.
4118 *
4119 * @param request {@link NetworkRequest} describing this request.
4120 * @param operation Action to perform when the network is available (corresponds
4121 * to the {@link NetworkCallback#onAvailable} call. Typically
4122 * comes from {@link PendingIntent#getBroadcast}. Cannot be null.
4123 * @throws RuntimeException if the app already has too many callbacks registered.
4124 */
4125 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4126 public void registerNetworkCallback(@NonNull NetworkRequest request,
4127 @NonNull PendingIntent operation) {
4128 printStackTrace();
4129 checkPendingIntentNotNull(operation);
4130 try {
4131 mService.pendingListenForNetwork(
Roshan Piusa8a477b2020-12-17 14:53:09 -08004132 request.networkCapabilities, operation, mContext.getOpPackageName(),
4133 getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004134 } catch (RemoteException e) {
4135 throw e.rethrowFromSystemServer();
4136 } catch (ServiceSpecificException e) {
4137 throw convertServiceException(e);
4138 }
4139 }
4140
4141 /**
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004142 * Registers to receive notifications about changes in the application's default network. This
4143 * may be a physical network or a virtual network, such as a VPN that applies to the
4144 * application. The callbacks will continue to be called until either the application exits or
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004145 * {@link #unregisterNetworkCallback(NetworkCallback)} is called.
4146 *
4147 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4148 * number of outstanding requests to 100 per app (identified by their UID), shared with
4149 * all variants of this method, of {@link #requestNetwork} as well as
4150 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4151 * Requesting a network with this method will count toward this limit. If this limit is
4152 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4153 * make sure to unregister the callbacks with
4154 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4155 *
4156 * @param networkCallback The {@link NetworkCallback} that the system will call as the
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004157 * application's default network changes.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004158 * The callback is invoked on the default internal Handler.
4159 * @throws RuntimeException if the app already has too many callbacks registered.
4160 */
4161 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4162 public void registerDefaultNetworkCallback(@NonNull NetworkCallback networkCallback) {
4163 registerDefaultNetworkCallback(networkCallback, getDefaultHandler());
4164 }
4165
4166 /**
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004167 * Registers to receive notifications about changes in the application's default network. This
4168 * may be a physical network or a virtual network, such as a VPN that applies to the
4169 * application. The callbacks will continue to be called until either the application exits or
4170 * {@link #unregisterNetworkCallback(NetworkCallback)} is called.
4171 *
4172 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4173 * number of outstanding requests to 100 per app (identified by their UID), shared with
4174 * all variants of this method, of {@link #requestNetwork} as well as
4175 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4176 * Requesting a network with this method will count toward this limit. If this limit is
4177 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4178 * make sure to unregister the callbacks with
4179 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4180 *
4181 * @param networkCallback The {@link NetworkCallback} that the system will call as the
4182 * application's default network changes.
4183 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4184 * @throws RuntimeException if the app already has too many callbacks registered.
4185 */
4186 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4187 public void registerDefaultNetworkCallback(@NonNull NetworkCallback networkCallback,
4188 @NonNull Handler handler) {
4189 CallbackHandler cbHandler = new CallbackHandler(handler);
4190 sendRequestForNetwork(null /* NetworkCapabilities need */, networkCallback, 0,
4191 TRACK_DEFAULT, TYPE_NONE, cbHandler);
4192 }
4193
4194 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004195 * Registers to receive notifications about changes in the system default network. The callbacks
4196 * will continue to be called until either the application exits or
4197 * {@link #unregisterNetworkCallback(NetworkCallback)} is called.
4198 *
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004199 * This method should not be used to determine networking state seen by applications, because in
4200 * many cases, most or even all application traffic may not use the default network directly,
4201 * and traffic from different applications may go on different networks by default. As an
4202 * example, if a VPN is connected, traffic from all applications might be sent through the VPN
4203 * and not onto the system default network. Applications or system components desiring to do
4204 * determine network state as seen by applications should use other methods such as
4205 * {@link #registerDefaultNetworkCallback(NetworkCallback, Handler)}.
4206 *
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004207 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4208 * number of outstanding requests to 100 per app (identified by their UID), shared with
4209 * all variants of this method, of {@link #requestNetwork} as well as
4210 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4211 * Requesting a network with this method will count toward this limit. If this limit is
4212 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4213 * make sure to unregister the callbacks with
4214 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4215 *
4216 * @param networkCallback The {@link NetworkCallback} that the system will call as the
4217 * system default network changes.
4218 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4219 * @throws RuntimeException if the app already has too many callbacks registered.
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004220 *
4221 * @hide
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004222 */
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004223 @SystemApi(client = MODULE_LIBRARIES)
4224 @SuppressLint({"ExecutorRegistration", "PairedRegistration"})
4225 @RequiresPermission(anyOf = {
4226 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
4227 android.Manifest.permission.NETWORK_SETTINGS})
4228 public void registerSystemDefaultNetworkCallback(@NonNull NetworkCallback networkCallback,
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004229 @NonNull Handler handler) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004230 CallbackHandler cbHandler = new CallbackHandler(handler);
4231 sendRequestForNetwork(null /* NetworkCapabilities need */, networkCallback, 0,
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004232 TRACK_SYSTEM_DEFAULT, TYPE_NONE, cbHandler);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004233 }
4234
4235 /**
junyulai5a5c99b2021-03-05 15:51:17 +08004236 * @hide
4237 */
4238 // TODO: Make it public api.
4239 @SuppressLint("ExecutorRegistration")
4240 public void registerBestMatchingNetworkCallback(@NonNull NetworkRequest request,
4241 @NonNull NetworkCallback networkCallback, @NonNull Handler handler) {
4242 final NetworkCapabilities nc = request.networkCapabilities;
4243 final CallbackHandler cbHandler = new CallbackHandler(handler);
4244 sendRequestForNetwork(nc, networkCallback, 0, TRACK_BEST, TYPE_NONE, cbHandler);
4245 }
4246
4247 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004248 * Requests bandwidth update for a given {@link Network} and returns whether the update request
4249 * is accepted by ConnectivityService. Once accepted, ConnectivityService will poll underlying
4250 * network connection for updated bandwidth information. The caller will be notified via
4251 * {@link ConnectivityManager.NetworkCallback} if there is an update. Notice that this
4252 * method assumes that the caller has previously called
4253 * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} to listen for network
4254 * changes.
4255 *
4256 * @param network {@link Network} specifying which network you're interested.
4257 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
4258 */
4259 public boolean requestBandwidthUpdate(@NonNull Network network) {
4260 try {
4261 return mService.requestBandwidthUpdate(network);
4262 } catch (RemoteException e) {
4263 throw e.rethrowFromSystemServer();
4264 }
4265 }
4266
4267 /**
4268 * Unregisters a {@code NetworkCallback} and possibly releases networks originating from
4269 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} and
4270 * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} calls.
4271 * If the given {@code NetworkCallback} had previously been used with
4272 * {@code #requestNetwork}, any networks that had been connected to only to satisfy that request
4273 * will be disconnected.
4274 *
4275 * Notifications that would have triggered that {@code NetworkCallback} will immediately stop
4276 * triggering it as soon as this call returns.
4277 *
4278 * @param networkCallback The {@link NetworkCallback} used when making the request.
4279 */
4280 public void unregisterNetworkCallback(@NonNull NetworkCallback networkCallback) {
4281 printStackTrace();
4282 checkCallbackNotNull(networkCallback);
4283 final List<NetworkRequest> reqs = new ArrayList<>();
4284 // Find all requests associated to this callback and stop callback triggers immediately.
4285 // Callback is reusable immediately. http://b/20701525, http://b/35921499.
4286 synchronized (sCallbacks) {
Remi NGUYEN VAN3f0e7dd2021-03-15 07:27:44 +00004287 Preconditions.checkArgument(networkCallback.networkRequest != null,
4288 "NetworkCallback was not registered");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004289 if (networkCallback.networkRequest == ALREADY_UNREGISTERED) {
4290 Log.d(TAG, "NetworkCallback was already unregistered");
4291 return;
4292 }
4293 for (Map.Entry<NetworkRequest, NetworkCallback> e : sCallbacks.entrySet()) {
4294 if (e.getValue() == networkCallback) {
4295 reqs.add(e.getKey());
4296 }
4297 }
4298 // TODO: throw exception if callback was registered more than once (http://b/20701525).
4299 for (NetworkRequest r : reqs) {
4300 try {
4301 mService.releaseNetworkRequest(r);
4302 } catch (RemoteException e) {
4303 throw e.rethrowFromSystemServer();
4304 }
4305 // Only remove mapping if rpc was successful.
4306 sCallbacks.remove(r);
4307 }
4308 networkCallback.networkRequest = ALREADY_UNREGISTERED;
4309 }
4310 }
4311
4312 /**
4313 * Unregisters a callback previously registered via
4314 * {@link #registerNetworkCallback(NetworkRequest, android.app.PendingIntent)}.
4315 *
4316 * @param operation A PendingIntent equal (as defined by {@link Intent#filterEquals}) to the
4317 * PendingIntent passed to
4318 * {@link #registerNetworkCallback(NetworkRequest, android.app.PendingIntent)}.
4319 * Cannot be null.
4320 */
4321 public void unregisterNetworkCallback(@NonNull PendingIntent operation) {
4322 releaseNetworkRequest(operation);
4323 }
4324
4325 /**
4326 * Informs the system whether it should switch to {@code network} regardless of whether it is
4327 * validated or not. If {@code accept} is true, and the network was explicitly selected by the
4328 * user (e.g., by selecting a Wi-Fi network in the Settings app), then the network will become
4329 * the system default network regardless of any other network that's currently connected. If
4330 * {@code always} is true, then the choice is remembered, so that the next time the user
4331 * connects to this network, the system will switch to it.
4332 *
4333 * @param network The network to accept.
4334 * @param accept Whether to accept the network even if unvalidated.
4335 * @param always Whether to remember this choice in the future.
4336 *
4337 * @hide
4338 */
4339 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
4340 public void setAcceptUnvalidated(Network network, boolean accept, boolean always) {
4341 try {
4342 mService.setAcceptUnvalidated(network, accept, always);
4343 } catch (RemoteException e) {
4344 throw e.rethrowFromSystemServer();
4345 }
4346 }
4347
4348 /**
4349 * Informs the system whether it should consider the network as validated even if it only has
4350 * partial connectivity. If {@code accept} is true, then the network will be considered as
4351 * validated even if connectivity is only partial. If {@code always} is true, then the choice
4352 * is remembered, so that the next time the user connects to this network, the system will
4353 * switch to it.
4354 *
4355 * @param network The network to accept.
4356 * @param accept Whether to consider the network as validated even if it has partial
4357 * connectivity.
4358 * @param always Whether to remember this choice in the future.
4359 *
4360 * @hide
4361 */
4362 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
4363 public void setAcceptPartialConnectivity(Network network, boolean accept, boolean always) {
4364 try {
4365 mService.setAcceptPartialConnectivity(network, accept, always);
4366 } catch (RemoteException e) {
4367 throw e.rethrowFromSystemServer();
4368 }
4369 }
4370
4371 /**
4372 * Informs the system to penalize {@code network}'s score when it becomes unvalidated. This is
4373 * only meaningful if the system is configured not to penalize such networks, e.g., if the
4374 * {@code config_networkAvoidBadWifi} configuration variable is set to 0 and the {@code
4375 * NETWORK_AVOID_BAD_WIFI setting is unset}.
4376 *
4377 * @param network The network to accept.
4378 *
4379 * @hide
4380 */
4381 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
4382 public void setAvoidUnvalidated(Network network) {
4383 try {
4384 mService.setAvoidUnvalidated(network);
4385 } catch (RemoteException e) {
4386 throw e.rethrowFromSystemServer();
4387 }
4388 }
4389
4390 /**
4391 * Requests that the system open the captive portal app on the specified network.
4392 *
4393 * @param network The network to log into.
4394 *
4395 * @hide
4396 */
4397 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
4398 public void startCaptivePortalApp(Network network) {
4399 try {
4400 mService.startCaptivePortalApp(network);
4401 } catch (RemoteException e) {
4402 throw e.rethrowFromSystemServer();
4403 }
4404 }
4405
4406 /**
4407 * Requests that the system open the captive portal app with the specified extras.
4408 *
4409 * <p>This endpoint is exclusively for use by the NetworkStack and is protected by the
4410 * corresponding permission.
4411 * @param network Network on which the captive portal was detected.
4412 * @param appExtras Extras to include in the app start intent.
4413 * @hide
4414 */
4415 @SystemApi
4416 @RequiresPermission(NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK)
4417 public void startCaptivePortalApp(@NonNull Network network, @NonNull Bundle appExtras) {
4418 try {
4419 mService.startCaptivePortalAppInternal(network, appExtras);
4420 } catch (RemoteException e) {
4421 throw e.rethrowFromSystemServer();
4422 }
4423 }
4424
4425 /**
4426 * Determine whether the device is configured to avoid bad wifi.
4427 * @hide
4428 */
4429 @SystemApi
4430 @RequiresPermission(anyOf = {
4431 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
4432 android.Manifest.permission.NETWORK_STACK})
4433 public boolean shouldAvoidBadWifi() {
4434 try {
4435 return mService.shouldAvoidBadWifi();
4436 } catch (RemoteException e) {
4437 throw e.rethrowFromSystemServer();
4438 }
4439 }
4440
4441 /**
4442 * It is acceptable to briefly use multipath data to provide seamless connectivity for
4443 * time-sensitive user-facing operations when the system default network is temporarily
4444 * unresponsive. The amount of data should be limited (less than one megabyte for every call to
4445 * this method), and the operation should be infrequent to ensure that data usage is limited.
4446 *
4447 * An example of such an operation might be a time-sensitive foreground activity, such as a
4448 * voice command, that the user is performing while walking out of range of a Wi-Fi network.
4449 */
4450 public static final int MULTIPATH_PREFERENCE_HANDOVER = 1 << 0;
4451
4452 /**
4453 * It is acceptable to use small amounts of multipath data on an ongoing basis to provide
4454 * a backup channel for traffic that is primarily going over another network.
4455 *
4456 * An example might be maintaining backup connections to peers or servers for the purpose of
4457 * fast fallback if the default network is temporarily unresponsive or disconnects. The traffic
4458 * on backup paths should be negligible compared to the traffic on the main path.
4459 */
4460 public static final int MULTIPATH_PREFERENCE_RELIABILITY = 1 << 1;
4461
4462 /**
4463 * It is acceptable to use metered data to improve network latency and performance.
4464 */
4465 public static final int MULTIPATH_PREFERENCE_PERFORMANCE = 1 << 2;
4466
4467 /**
4468 * Return value to use for unmetered networks. On such networks we currently set all the flags
4469 * to true.
4470 * @hide
4471 */
4472 public static final int MULTIPATH_PREFERENCE_UNMETERED =
4473 MULTIPATH_PREFERENCE_HANDOVER |
4474 MULTIPATH_PREFERENCE_RELIABILITY |
4475 MULTIPATH_PREFERENCE_PERFORMANCE;
4476
4477 /** @hide */
4478 @Retention(RetentionPolicy.SOURCE)
4479 @IntDef(flag = true, value = {
4480 MULTIPATH_PREFERENCE_HANDOVER,
4481 MULTIPATH_PREFERENCE_RELIABILITY,
4482 MULTIPATH_PREFERENCE_PERFORMANCE,
4483 })
4484 public @interface MultipathPreference {
4485 }
4486
4487 /**
4488 * Provides a hint to the calling application on whether it is desirable to use the
4489 * multinetwork APIs (e.g., {@link Network#openConnection}, {@link Network#bindSocket}, etc.)
4490 * for multipath data transfer on this network when it is not the system default network.
4491 * Applications desiring to use multipath network protocols should call this method before
4492 * each such operation.
4493 *
4494 * @param network The network on which the application desires to use multipath data.
4495 * If {@code null}, this method will return the a preference that will generally
4496 * apply to metered networks.
4497 * @return a bitwise OR of zero or more of the {@code MULTIPATH_PREFERENCE_*} constants.
4498 */
4499 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4500 public @MultipathPreference int getMultipathPreference(@Nullable Network network) {
4501 try {
4502 return mService.getMultipathPreference(network);
4503 } catch (RemoteException e) {
4504 throw e.rethrowFromSystemServer();
4505 }
4506 }
4507
4508 /**
4509 * Resets all connectivity manager settings back to factory defaults.
4510 * @hide
4511 */
4512 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
4513 public void factoryReset() {
4514 try {
4515 mService.factoryReset();
4516 mTetheringManager.stopAllTethering();
4517 } catch (RemoteException e) {
4518 throw e.rethrowFromSystemServer();
4519 }
4520 }
4521
4522 /**
4523 * Binds the current process to {@code network}. All Sockets created in the future
4524 * (and not explicitly bound via a bound SocketFactory from
4525 * {@link Network#getSocketFactory() Network.getSocketFactory()}) will be bound to
4526 * {@code network}. All host name resolutions will be limited to {@code network} as well.
4527 * Note that if {@code network} ever disconnects, all Sockets created in this way will cease to
4528 * work and all host name resolutions will fail. This is by design so an application doesn't
4529 * accidentally use Sockets it thinks are still bound to a particular {@link Network}.
4530 * To clear binding pass {@code null} for {@code network}. Using individually bound
4531 * Sockets created by Network.getSocketFactory().createSocket() and
4532 * performing network-specific host name resolutions via
4533 * {@link Network#getAllByName Network.getAllByName} is preferred to calling
4534 * {@code bindProcessToNetwork}.
4535 *
4536 * @param network The {@link Network} to bind the current process to, or {@code null} to clear
4537 * the current binding.
4538 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
4539 */
4540 public boolean bindProcessToNetwork(@Nullable Network network) {
4541 // Forcing callers to call through non-static function ensures ConnectivityManager
4542 // instantiated.
4543 return setProcessDefaultNetwork(network);
4544 }
4545
4546 /**
4547 * Binds the current process to {@code network}. All Sockets created in the future
4548 * (and not explicitly bound via a bound SocketFactory from
4549 * {@link Network#getSocketFactory() Network.getSocketFactory()}) will be bound to
4550 * {@code network}. All host name resolutions will be limited to {@code network} as well.
4551 * Note that if {@code network} ever disconnects, all Sockets created in this way will cease to
4552 * work and all host name resolutions will fail. This is by design so an application doesn't
4553 * accidentally use Sockets it thinks are still bound to a particular {@link Network}.
4554 * To clear binding pass {@code null} for {@code network}. Using individually bound
4555 * Sockets created by Network.getSocketFactory().createSocket() and
4556 * performing network-specific host name resolutions via
4557 * {@link Network#getAllByName Network.getAllByName} is preferred to calling
4558 * {@code setProcessDefaultNetwork}.
4559 *
4560 * @param network The {@link Network} to bind the current process to, or {@code null} to clear
4561 * the current binding.
4562 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
4563 * @deprecated This function can throw {@link IllegalStateException}. Use
4564 * {@link #bindProcessToNetwork} instead. {@code bindProcessToNetwork}
4565 * is a direct replacement.
4566 */
4567 @Deprecated
4568 public static boolean setProcessDefaultNetwork(@Nullable Network network) {
4569 int netId = (network == null) ? NETID_UNSET : network.netId;
4570 boolean isSameNetId = (netId == NetworkUtils.getBoundNetworkForProcess());
4571
4572 if (netId != NETID_UNSET) {
4573 netId = network.getNetIdForResolv();
4574 }
4575
4576 if (!NetworkUtils.bindProcessToNetwork(netId)) {
4577 return false;
4578 }
4579
4580 if (!isSameNetId) {
4581 // Set HTTP proxy system properties to match network.
4582 // TODO: Deprecate this static method and replace it with a non-static version.
4583 try {
Remi NGUYEN VAN345c2df2021-02-03 10:18:20 +09004584 Proxy.setHttpProxyConfiguration(getInstance().getDefaultProxy());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004585 } catch (SecurityException e) {
4586 // The process doesn't have ACCESS_NETWORK_STATE, so we can't fetch the proxy.
4587 Log.e(TAG, "Can't set proxy properties", e);
4588 }
4589 // Must flush DNS cache as new network may have different DNS resolutions.
4590 InetAddress.clearDnsCache();
4591 // Must flush socket pool as idle sockets will be bound to previous network and may
4592 // cause subsequent fetches to be performed on old network.
4593 NetworkEventDispatcher.getInstance().onNetworkConfigurationChanged();
4594 }
4595
4596 return true;
4597 }
4598
4599 /**
4600 * Returns the {@link Network} currently bound to this process via
4601 * {@link #bindProcessToNetwork}, or {@code null} if no {@link Network} is explicitly bound.
4602 *
4603 * @return {@code Network} to which this process is bound, or {@code null}.
4604 */
4605 @Nullable
4606 public Network getBoundNetworkForProcess() {
4607 // Forcing callers to call thru non-static function ensures ConnectivityManager
4608 // instantiated.
4609 return getProcessDefaultNetwork();
4610 }
4611
4612 /**
4613 * Returns the {@link Network} currently bound to this process via
4614 * {@link #bindProcessToNetwork}, or {@code null} if no {@link Network} is explicitly bound.
4615 *
4616 * @return {@code Network} to which this process is bound, or {@code null}.
4617 * @deprecated Using this function can lead to other functions throwing
4618 * {@link IllegalStateException}. Use {@link #getBoundNetworkForProcess} instead.
4619 * {@code getBoundNetworkForProcess} is a direct replacement.
4620 */
4621 @Deprecated
4622 @Nullable
4623 public static Network getProcessDefaultNetwork() {
4624 int netId = NetworkUtils.getBoundNetworkForProcess();
4625 if (netId == NETID_UNSET) return null;
4626 return new Network(netId);
4627 }
4628
4629 private void unsupportedStartingFrom(int version) {
4630 if (Process.myUid() == Process.SYSTEM_UID) {
4631 // The getApplicationInfo() call we make below is not supported in system context. Let
4632 // the call through here, and rely on the fact that ConnectivityService will refuse to
4633 // allow the system to use these APIs anyway.
4634 return;
4635 }
4636
4637 if (mContext.getApplicationInfo().targetSdkVersion >= version) {
4638 throw new UnsupportedOperationException(
4639 "This method is not supported in target SDK version " + version + " and above");
4640 }
4641 }
4642
4643 // Checks whether the calling app can use the legacy routing API (startUsingNetworkFeature,
4644 // stopUsingNetworkFeature, requestRouteToHost), and if not throw UnsupportedOperationException.
4645 // TODO: convert the existing system users (Tethering, GnssLocationProvider) to the new APIs and
4646 // remove these exemptions. Note that this check is not secure, and apps can still access these
4647 // functions by accessing ConnectivityService directly. However, it should be clear that doing
4648 // so is unsupported and may break in the future. http://b/22728205
4649 private void checkLegacyRoutingApiAccess() {
4650 unsupportedStartingFrom(VERSION_CODES.M);
4651 }
4652
4653 /**
4654 * Binds host resolutions performed by this process to {@code network}.
4655 * {@link #bindProcessToNetwork} takes precedence over this setting.
4656 *
4657 * @param network The {@link Network} to bind host resolutions from the current process to, or
4658 * {@code null} to clear the current binding.
4659 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
4660 * @hide
4661 * @deprecated This is strictly for legacy usage to support {@link #startUsingNetworkFeature}.
4662 */
4663 @Deprecated
4664 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
4665 public static boolean setProcessDefaultNetworkForHostResolution(Network network) {
4666 return NetworkUtils.bindProcessToNetworkForHostResolution(
4667 (network == null) ? NETID_UNSET : network.getNetIdForResolv());
4668 }
4669
4670 /**
4671 * Device is not restricting metered network activity while application is running on
4672 * background.
4673 */
4674 public static final int RESTRICT_BACKGROUND_STATUS_DISABLED = 1;
4675
4676 /**
4677 * Device is restricting metered network activity while application is running on background,
4678 * but application is allowed to bypass it.
4679 * <p>
4680 * In this state, application should take action to mitigate metered network access.
4681 * For example, a music streaming application should switch to a low-bandwidth bitrate.
4682 */
4683 public static final int RESTRICT_BACKGROUND_STATUS_WHITELISTED = 2;
4684
4685 /**
4686 * Device is restricting metered network activity while application is running on background.
4687 * <p>
4688 * In this state, application should not try to use the network while running on background,
4689 * because it would be denied.
4690 */
4691 public static final int RESTRICT_BACKGROUND_STATUS_ENABLED = 3;
4692
4693 /**
4694 * A change in the background metered network activity restriction has occurred.
4695 * <p>
4696 * Applications should call {@link #getRestrictBackgroundStatus()} to check if the restriction
4697 * applies to them.
4698 * <p>
4699 * This is only sent to registered receivers, not manifest receivers.
4700 */
4701 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
4702 public static final String ACTION_RESTRICT_BACKGROUND_CHANGED =
4703 "android.net.conn.RESTRICT_BACKGROUND_CHANGED";
4704
4705 /** @hide */
4706 @Retention(RetentionPolicy.SOURCE)
4707 @IntDef(flag = false, value = {
4708 RESTRICT_BACKGROUND_STATUS_DISABLED,
4709 RESTRICT_BACKGROUND_STATUS_WHITELISTED,
4710 RESTRICT_BACKGROUND_STATUS_ENABLED,
4711 })
4712 public @interface RestrictBackgroundStatus {
4713 }
4714
4715 private INetworkPolicyManager getNetworkPolicyManager() {
4716 synchronized (this) {
4717 if (mNPManager != null) {
4718 return mNPManager;
4719 }
4720 mNPManager = INetworkPolicyManager.Stub.asInterface(ServiceManager
4721 .getService(Context.NETWORK_POLICY_SERVICE));
4722 return mNPManager;
4723 }
4724 }
4725
4726 /**
4727 * Determines if the calling application is subject to metered network restrictions while
4728 * running on background.
4729 *
4730 * @return {@link #RESTRICT_BACKGROUND_STATUS_DISABLED},
4731 * {@link #RESTRICT_BACKGROUND_STATUS_ENABLED},
4732 * or {@link #RESTRICT_BACKGROUND_STATUS_WHITELISTED}
4733 */
4734 public @RestrictBackgroundStatus int getRestrictBackgroundStatus() {
4735 try {
4736 return getNetworkPolicyManager().getRestrictBackgroundByCaller();
4737 } catch (RemoteException e) {
4738 throw e.rethrowFromSystemServer();
4739 }
4740 }
4741
4742 /**
4743 * The network watchlist is a list of domains and IP addresses that are associated with
4744 * potentially harmful apps. This method returns the SHA-256 of the watchlist config file
4745 * currently used by the system for validation purposes.
4746 *
4747 * @return Hash of network watchlist config file. Null if config does not exist.
4748 */
4749 @Nullable
4750 public byte[] getNetworkWatchlistConfigHash() {
4751 try {
4752 return mService.getNetworkWatchlistConfigHash();
4753 } catch (RemoteException e) {
4754 Log.e(TAG, "Unable to get watchlist config hash");
4755 throw e.rethrowFromSystemServer();
4756 }
4757 }
4758
4759 /**
4760 * Returns the {@code uid} of the owner of a network connection.
4761 *
4762 * @param protocol The protocol of the connection. Only {@code IPPROTO_TCP} and {@code
4763 * IPPROTO_UDP} currently supported.
4764 * @param local The local {@link InetSocketAddress} of a connection.
4765 * @param remote The remote {@link InetSocketAddress} of a connection.
4766 * @return {@code uid} if the connection is found and the app has permission to observe it
4767 * (e.g., if it is associated with the calling VPN app's VpnService tunnel) or {@link
4768 * android.os.Process#INVALID_UID} if the connection is not found.
4769 * @throws {@link SecurityException} if the caller is not the active VpnService for the current
4770 * user.
4771 * @throws {@link IllegalArgumentException} if an unsupported protocol is requested.
4772 */
4773 public int getConnectionOwnerUid(
4774 int protocol, @NonNull InetSocketAddress local, @NonNull InetSocketAddress remote) {
4775 ConnectionInfo connectionInfo = new ConnectionInfo(protocol, local, remote);
4776 try {
4777 return mService.getConnectionOwnerUid(connectionInfo);
4778 } catch (RemoteException e) {
4779 throw e.rethrowFromSystemServer();
4780 }
4781 }
4782
4783 private void printStackTrace() {
4784 if (DEBUG) {
4785 final StackTraceElement[] callStack = Thread.currentThread().getStackTrace();
4786 final StringBuffer sb = new StringBuffer();
4787 for (int i = 3; i < callStack.length; i++) {
4788 final String stackTrace = callStack[i].toString();
4789 if (stackTrace == null || stackTrace.contains("android.os")) {
4790 break;
4791 }
4792 sb.append(" [").append(stackTrace).append("]");
4793 }
4794 Log.d(TAG, "StackLog:" + sb.toString());
4795 }
4796 }
4797
Remi NGUYEN VAN91444ca2021-01-15 23:02:47 +09004798 /** @hide */
4799 public TestNetworkManager startOrGetTestNetworkManager() {
4800 final IBinder tnBinder;
4801 try {
4802 tnBinder = mService.startOrGetTestNetworkService();
4803 } catch (RemoteException e) {
4804 throw e.rethrowFromSystemServer();
4805 }
4806
4807 return new TestNetworkManager(ITestNetworkManager.Stub.asInterface(tnBinder));
4808 }
4809
Remi NGUYEN VAN91444ca2021-01-15 23:02:47 +09004810 /** @hide */
4811 public ConnectivityDiagnosticsManager createDiagnosticsManager() {
4812 return new ConnectivityDiagnosticsManager(mContext, mService);
4813 }
4814
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004815 /**
4816 * Simulates a Data Stall for the specified Network.
4817 *
4818 * <p>This method should only be used for tests.
4819 *
4820 * <p>The caller must be the owner of the specified Network.
4821 *
4822 * @param detectionMethod The detection method used to identify the Data Stall.
4823 * @param timestampMillis The timestamp at which the stall 'occurred', in milliseconds.
4824 * @param network The Network for which a Data Stall is being simluated.
4825 * @param extras The PersistableBundle of extras included in the Data Stall notification.
4826 * @throws SecurityException if the caller is not the owner of the given network.
4827 * @hide
4828 */
4829 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
4830 @RequiresPermission(anyOf = {android.Manifest.permission.MANAGE_TEST_NETWORKS,
4831 android.Manifest.permission.NETWORK_STACK})
4832 public void simulateDataStall(int detectionMethod, long timestampMillis,
4833 @NonNull Network network, @NonNull PersistableBundle extras) {
4834 try {
4835 mService.simulateDataStall(detectionMethod, timestampMillis, network, extras);
4836 } catch (RemoteException e) {
4837 e.rethrowFromSystemServer();
4838 }
4839 }
4840
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004841 @NonNull
4842 private final List<QosCallbackConnection> mQosCallbackConnections = new ArrayList<>();
4843
4844 /**
4845 * Registers a {@link QosSocketInfo} with an associated {@link QosCallback}. The callback will
4846 * receive available QoS events related to the {@link Network} and local ip + port
4847 * specified within socketInfo.
4848 * <p/>
4849 * The same {@link QosCallback} must be unregistered before being registered a second time,
4850 * otherwise {@link QosCallbackRegistrationException} is thrown.
4851 * <p/>
4852 * This API does not, in itself, require any permission if called with a network that is not
4853 * restricted. However, the underlying implementation currently only supports the IMS network,
4854 * which is always restricted. That means non-preinstalled callers can't possibly find this API
4855 * useful, because they'd never be called back on networks that they would have access to.
4856 *
4857 * @throws SecurityException if {@link QosSocketInfo#getNetwork()} is restricted and the app is
4858 * missing CONNECTIVITY_USE_RESTRICTED_NETWORKS permission.
4859 * @throws QosCallback.QosCallbackRegistrationException if qosCallback is already registered.
4860 * @throws RuntimeException if the app already has too many callbacks registered.
4861 *
4862 * Exceptions after the time of registration is passed through
4863 * {@link QosCallback#onError(QosCallbackException)}. see: {@link QosCallbackException}.
4864 *
4865 * @param socketInfo the socket information used to match QoS events
4866 * @param callback receives qos events that satisfy socketInfo
4867 * @param executor The executor on which the callback will be invoked. The provided
4868 * {@link Executor} must run callback sequentially, otherwise the order of
4869 * callbacks cannot be guaranteed.
4870 *
4871 * @hide
4872 */
4873 @SystemApi
4874 public void registerQosCallback(@NonNull final QosSocketInfo socketInfo,
4875 @NonNull final QosCallback callback,
4876 @CallbackExecutor @NonNull final Executor executor) {
4877 Objects.requireNonNull(socketInfo, "socketInfo must be non-null");
4878 Objects.requireNonNull(callback, "callback must be non-null");
4879 Objects.requireNonNull(executor, "executor must be non-null");
4880
4881 try {
4882 synchronized (mQosCallbackConnections) {
4883 if (getQosCallbackConnection(callback) == null) {
4884 final QosCallbackConnection connection =
4885 new QosCallbackConnection(this, callback, executor);
4886 mQosCallbackConnections.add(connection);
4887 mService.registerQosSocketCallback(socketInfo, connection);
4888 } else {
4889 Log.e(TAG, "registerQosCallback: Callback already registered");
4890 throw new QosCallbackRegistrationException();
4891 }
4892 }
4893 } catch (final RemoteException e) {
4894 Log.e(TAG, "registerQosCallback: Error while registering ", e);
4895
4896 // The same unregister method method is called for consistency even though nothing
4897 // will be sent to the ConnectivityService since the callback was never successfully
4898 // registered.
4899 unregisterQosCallback(callback);
4900 e.rethrowFromSystemServer();
4901 } catch (final ServiceSpecificException e) {
4902 Log.e(TAG, "registerQosCallback: Error while registering ", e);
4903 unregisterQosCallback(callback);
4904 throw convertServiceException(e);
4905 }
4906 }
4907
4908 /**
4909 * Unregisters the given {@link QosCallback}. The {@link QosCallback} will no longer receive
4910 * events once unregistered and can be registered a second time.
4911 * <p/>
4912 * If the {@link QosCallback} does not have an active registration, it is a no-op.
4913 *
4914 * @param callback the callback being unregistered
4915 *
4916 * @hide
4917 */
4918 @SystemApi
4919 public void unregisterQosCallback(@NonNull final QosCallback callback) {
4920 Objects.requireNonNull(callback, "The callback must be non-null");
4921 try {
4922 synchronized (mQosCallbackConnections) {
4923 final QosCallbackConnection connection = getQosCallbackConnection(callback);
4924 if (connection != null) {
4925 connection.stopReceivingMessages();
4926 mService.unregisterQosCallback(connection);
4927 mQosCallbackConnections.remove(connection);
4928 } else {
4929 Log.d(TAG, "unregisterQosCallback: Callback not registered");
4930 }
4931 }
4932 } catch (final RemoteException e) {
4933 Log.e(TAG, "unregisterQosCallback: Error while unregistering ", e);
4934 e.rethrowFromSystemServer();
4935 }
4936 }
4937
4938 /**
4939 * Gets the connection related to the callback.
4940 *
4941 * @param callback the callback to look up
4942 * @return the related connection
4943 */
4944 @Nullable
4945 private QosCallbackConnection getQosCallbackConnection(final QosCallback callback) {
4946 for (final QosCallbackConnection connection : mQosCallbackConnections) {
4947 // Checking by reference here is intentional
4948 if (connection.getCallback() == callback) {
4949 return connection;
4950 }
4951 }
4952 return null;
4953 }
4954
4955 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08004956 * Request a network to satisfy a set of {@link NetworkCapabilities}, but
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004957 * does not cause any networks to retain the NET_CAPABILITY_FOREGROUND capability. This can
4958 * be used to request that the system provide a network without causing the network to be
4959 * in the foreground.
4960 *
4961 * <p>This method will attempt to find the best network that matches the passed
4962 * {@link NetworkRequest}, and to bring up one that does if none currently satisfies the
4963 * criteria. The platform will evaluate which network is the best at its own discretion.
4964 * Throughput, latency, cost per byte, policy, user preference and other considerations
4965 * may be factored in the decision of what is considered the best network.
4966 *
4967 * <p>As long as this request is outstanding, the platform will try to maintain the best network
4968 * matching this request, while always attempting to match the request to a better network if
4969 * possible. If a better match is found, the platform will switch this request to the now-best
4970 * network and inform the app of the newly best network by invoking
4971 * {@link NetworkCallback#onAvailable(Network)} on the provided callback. Note that the platform
4972 * will not try to maintain any other network than the best one currently matching the request:
4973 * a network not matching any network request may be disconnected at any time.
4974 *
4975 * <p>For example, an application could use this method to obtain a connected cellular network
4976 * even if the device currently has a data connection over Ethernet. This may cause the cellular
4977 * radio to consume additional power. Or, an application could inform the system that it wants
4978 * a network supporting sending MMSes and have the system let it know about the currently best
4979 * MMS-supporting network through the provided {@link NetworkCallback}.
4980 *
4981 * <p>The status of the request can be followed by listening to the various callbacks described
4982 * in {@link NetworkCallback}. The {@link Network} object passed to the callback methods can be
4983 * used to direct traffic to the network (although accessing some networks may be subject to
4984 * holding specific permissions). Callers will learn about the specific characteristics of the
4985 * network through
4986 * {@link NetworkCallback#onCapabilitiesChanged(Network, NetworkCapabilities)} and
4987 * {@link NetworkCallback#onLinkPropertiesChanged(Network, LinkProperties)}. The methods of the
4988 * provided {@link NetworkCallback} will only be invoked due to changes in the best network
4989 * matching the request at any given time; therefore when a better network matching the request
4990 * becomes available, the {@link NetworkCallback#onAvailable(Network)} method is called
4991 * with the new network after which no further updates are given about the previously-best
4992 * network, unless it becomes the best again at some later time. All callbacks are invoked
4993 * in order on the same thread, which by default is a thread created by the framework running
4994 * in the app.
4995 *
4996 * <p>This{@link NetworkRequest} will live until released via
4997 * {@link #unregisterNetworkCallback(NetworkCallback)} or the calling application exits, at
4998 * which point the system may let go of the network at any time.
4999 *
5000 * <p>It is presently unsupported to request a network with mutable
5001 * {@link NetworkCapabilities} such as
5002 * {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
5003 * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}
5004 * as these {@code NetworkCapabilities} represent states that a particular
5005 * network may never attain, and whether a network will attain these states
5006 * is unknown prior to bringing up the network so the framework does not
5007 * know how to go about satisfying a request with these capabilities.
5008 *
5009 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
5010 * number of outstanding requests to 100 per app (identified by their UID), shared with
5011 * all variants of this method, of {@link #registerNetworkCallback} as well as
5012 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
5013 * Requesting a network with this method will count toward this limit. If this limit is
5014 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
5015 * make sure to unregister the callbacks with
5016 * {@link #unregisterNetworkCallback(NetworkCallback)}.
5017 *
5018 * @param request {@link NetworkRequest} describing this request.
5019 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
5020 * If null, the callback is invoked on the default internal Handler.
5021 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
5022 * the callback must not be shared - it uniquely specifies this request.
5023 * @throws IllegalArgumentException if {@code request} contains invalid network capabilities.
5024 * @throws SecurityException if missing the appropriate permissions.
5025 * @throws RuntimeException if the app already has too many callbacks registered.
5026 *
5027 * @hide
5028 */
5029 @SystemApi(client = MODULE_LIBRARIES)
5030 @SuppressLint("ExecutorRegistration")
5031 @RequiresPermission(anyOf = {
5032 android.Manifest.permission.NETWORK_SETTINGS,
5033 android.Manifest.permission.NETWORK_STACK,
5034 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK
5035 })
5036 public void requestBackgroundNetwork(@NonNull NetworkRequest request,
junyulaidbb70462021-03-09 20:49:48 +08005037 @NonNull Handler handler, @NonNull NetworkCallback networkCallback) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005038 final NetworkCapabilities nc = request.networkCapabilities;
5039 sendRequestForNetwork(nc, networkCallback, 0, BACKGROUND_REQUEST,
junyulaidbb70462021-03-09 20:49:48 +08005040 TYPE_NONE, new CallbackHandler(handler));
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005041 }
James Mattis12aeab82021-01-10 14:24:24 -08005042
5043 /**
5044 * Listener for {@link #setOemNetworkPreference(OemNetworkPreferences, Executor,
5045 * OnSetOemNetworkPreferenceListener)}.
James Mattis6e2d7022021-01-26 16:23:52 -08005046 * @hide
James Mattis12aeab82021-01-10 14:24:24 -08005047 */
James Mattis6e2d7022021-01-26 16:23:52 -08005048 @SystemApi
5049 public interface OnSetOemNetworkPreferenceListener {
James Mattis12aeab82021-01-10 14:24:24 -08005050 /**
5051 * Called when setOemNetworkPreference() successfully completes.
5052 */
5053 void onComplete();
5054 }
5055
5056 /**
5057 * Used by automotive devices to set the network preferences used to direct traffic at an
5058 * application level as per the given OemNetworkPreferences. An example use-case would be an
5059 * automotive OEM wanting to provide connectivity for applications critical to the usage of a
5060 * vehicle via a particular network.
5061 *
5062 * Calling this will overwrite the existing preference.
5063 *
5064 * @param preference {@link OemNetworkPreferences} The application network preference to be set.
5065 * @param executor the executor on which listener will be invoked.
5066 * @param listener {@link OnSetOemNetworkPreferenceListener} optional listener used to
5067 * communicate completion of setOemNetworkPreference(). This will only be
5068 * called once upon successful completion of setOemNetworkPreference().
5069 * @throws IllegalArgumentException if {@code preference} contains invalid preference values.
5070 * @throws SecurityException if missing the appropriate permissions.
5071 * @throws UnsupportedOperationException if called on a non-automotive device.
James Mattis6e2d7022021-01-26 16:23:52 -08005072 * @hide
James Mattis12aeab82021-01-10 14:24:24 -08005073 */
James Mattis6e2d7022021-01-26 16:23:52 -08005074 @SystemApi
James Mattisa46c1442021-01-26 14:05:36 -08005075 @RequiresPermission(android.Manifest.permission.CONTROL_OEM_PAID_NETWORK_PREFERENCE)
James Mattis6e2d7022021-01-26 16:23:52 -08005076 public void setOemNetworkPreference(@NonNull final OemNetworkPreferences preference,
James Mattis12aeab82021-01-10 14:24:24 -08005077 @Nullable @CallbackExecutor final Executor executor,
5078 @Nullable final OnSetOemNetworkPreferenceListener listener) {
5079 Objects.requireNonNull(preference, "OemNetworkPreferences must be non-null");
5080 if (null != listener) {
5081 Objects.requireNonNull(executor, "Executor must be non-null");
5082 }
5083 final IOnSetOemNetworkPreferenceListener listenerInternal = listener == null ? null :
5084 new IOnSetOemNetworkPreferenceListener.Stub() {
5085 @Override
5086 public void onComplete() {
5087 executor.execute(listener::onComplete);
5088 }
5089 };
5090
5091 try {
5092 mService.setOemNetworkPreference(preference, listenerInternal);
5093 } catch (RemoteException e) {
5094 Log.e(TAG, "setOemNetworkPreference() failed for preference: " + preference.toString());
5095 throw e.rethrowFromSystemServer();
5096 }
5097 }
lucaslin5cdbcfb2021-03-12 00:46:33 +08005098
5099 // The first network ID of IPSec tunnel interface.
5100 private static final int TUN_INTF_NETID_START = 0xFC00;
5101 // The network ID range of IPSec tunnel interface.
5102 private static final int TUN_INTF_NETID_RANGE = 0x0400;
5103
5104 /**
5105 * Get the network ID range reserved for IPSec tunnel interfaces.
5106 *
5107 * @return A Range which indicates the network ID range of IPSec tunnel interface.
5108 * @hide
5109 */
5110 @SystemApi(client = MODULE_LIBRARIES)
5111 @NonNull
5112 public static Range<Integer> getIpSecNetIdRange() {
5113 return new Range(TUN_INTF_NETID_START, TUN_INTF_NETID_START + TUN_INTF_NETID_RANGE - 1);
5114 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005115}