blob: 18b2b7804fb0eabaeee83a7648b6da0dc289b3fc [file] [log] [blame]
Erik Kline79868f82017-01-21 14:33:56 +09001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
markchien503be612020-04-12 21:41:29 +080017package com.android.networkstack.tethering;
Erik Kline79868f82017-01-21 14:33:56 +090018
Erik Kline54f2f372017-05-15 21:11:47 +090019import static android.content.Context.TELEPHONY_SERVICE;
Erik Kline1e543512017-03-09 11:44:11 +090020import static android.net.ConnectivityManager.TYPE_ETHERNET;
Erik Kline79868f82017-01-21 14:33:56 +090021import static android.net.ConnectivityManager.TYPE_MOBILE;
22import static android.net.ConnectivityManager.TYPE_MOBILE_DUN;
23import static android.net.ConnectivityManager.TYPE_MOBILE_HIPRI;
markchien2dfee022020-01-13 16:09:42 +080024import static android.provider.DeviceConfig.NAMESPACE_CONNECTIVITY;
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +090025
Erik Kline79868f82017-01-21 14:33:56 +090026import android.content.Context;
27import android.content.res.Resources;
markchien0df2ebc42019-09-30 14:40:57 +080028import android.net.TetheringConfigurationParcel;
Erik Klinee93ed612018-04-10 07:01:16 +000029import android.net.util.SharedLog;
markchien2dfee022020-01-13 16:09:42 +080030import android.provider.DeviceConfig;
markchien0b595072019-01-08 23:52:21 +080031import android.telephony.SubscriptionManager;
Erik Klinee0f34032018-02-28 15:01:35 +090032import android.telephony.TelephonyManager;
33import android.text.TextUtils;
Erik Kline79868f82017-01-21 14:33:56 +090034
Chalard Jean918a68b2018-01-19 17:00:47 +090035import com.android.internal.annotations.VisibleForTesting;
36
Erik Kline9db1b542017-03-16 14:10:27 +090037import java.io.PrintWriter;
Erik Kline79868f82017-01-21 14:33:56 +090038import java.util.ArrayList;
39import java.util.Arrays;
40import java.util.Collection;
Erik Kline9db1b542017-03-16 14:10:27 +090041import java.util.StringJoiner;
Erik Kline79868f82017-01-21 14:33:56 +090042
43
44/**
45 * A utility class to encapsulate the various tethering configuration elements.
46 *
47 * This configuration data includes elements describing upstream properties
48 * (preferred and required types of upstream connectivity as well as default
49 * DNS servers to use if none are available) and downstream properties (such
50 * as regular expressions use to match suitable downstream interfaces and the
51 * DHCPv4 ranges to use).
52 *
53 * @hide
54 */
55public class TetheringConfiguration {
56 private static final String TAG = TetheringConfiguration.class.getSimpleName();
57
Erik Klinee0f34032018-02-28 15:01:35 +090058 private static final String[] EMPTY_STRING_ARRAY = new String[0];
59
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +090060 // Default ranges used for the legacy DHCP server.
Erik Kline79868f82017-01-21 14:33:56 +090061 // USB is 192.168.42.1 and 255.255.255.0
62 // Wifi is 192.168.43.1 and 255.255.255.0
63 // BT is limited to max default of 5 connections. 192.168.44.1 to 192.168.48.1
64 // with 255.255.255.0
65 // P2P is 192.168.49.1 and 255.255.255.0
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +090066 private static final String[] LEGACY_DHCP_DEFAULT_RANGE = {
Erik Kline79868f82017-01-21 14:33:56 +090067 "192.168.42.2", "192.168.42.254", "192.168.43.2", "192.168.43.254",
68 "192.168.44.2", "192.168.44.254", "192.168.45.2", "192.168.45.254",
69 "192.168.46.2", "192.168.46.254", "192.168.47.2", "192.168.47.254",
70 "192.168.48.2", "192.168.48.254", "192.168.49.2", "192.168.49.254",
71 };
72
markchiena6ba54d2019-09-03 15:58:06 +080073 private static final String[] DEFAULT_IPV4_DNS = {"8.8.4.4", "8.8.8.8"};
Erik Kline79868f82017-01-21 14:33:56 +090074
markchien2dfee022020-01-13 16:09:42 +080075 /**
Nucca Chen95e0bac2020-05-12 11:34:28 +000076 * Override enabling BPF offload configuration for tethering.
77 */
78 public static final String OVERRIDE_TETHER_ENABLE_BPF_OFFLOAD =
79 "override_tether_enable_bpf_offload";
80
81 /**
markchien2dfee022020-01-13 16:09:42 +080082 * Use the old dnsmasq DHCP server for tethering instead of the framework implementation.
83 */
84 public static final String TETHER_ENABLE_LEGACY_DHCP_SERVER =
85 "tether_enable_legacy_dhcp_server";
86
junyulaiaea13ae2020-04-30 15:21:55 +080087 /**
88 * Default value that used to periodic polls tether offload stats from tethering offload HAL
89 * to make the data warnings work.
90 */
91 public static final int DEFAULT_TETHER_OFFLOAD_POLL_INTERVAL_MS = 5000;
92
Erik Kline79868f82017-01-21 14:33:56 +090093 public final String[] tetherableUsbRegexs;
94 public final String[] tetherableWifiRegexs;
Jimmy Chenbcd86d02019-07-15 18:03:23 +080095 public final String[] tetherableWifiP2pRegexs;
Erik Kline79868f82017-01-21 14:33:56 +090096 public final String[] tetherableBluetoothRegexs;
Milim Lee31ef4c02019-10-17 05:02:33 +090097 public final String[] tetherableNcmRegexs;
Erik Kline79868f82017-01-21 14:33:56 +090098 public final boolean isDunRequired;
Erik Kline72302902018-06-14 17:36:40 +090099 public final boolean chooseUpstreamAutomatically;
Erik Kline79868f82017-01-21 14:33:56 +0900100 public final Collection<Integer> preferredUpstreamIfaceTypes;
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +0900101 public final String[] legacyDhcpRanges;
Erik Kline79868f82017-01-21 14:33:56 +0900102 public final String[] defaultIPv4DNS;
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +0900103 public final boolean enableLegacyDhcpServer;
Erik Kline79868f82017-01-21 14:33:56 +0900104
Erik Klinee0f34032018-02-28 15:01:35 +0900105 public final String[] provisioningApp;
106 public final String provisioningAppNoUi;
markchien3b519632018-09-07 16:19:12 +0800107 public final int provisioningCheckPeriod;
Mark Chien5b0fdf62020-06-12 17:35:18 +0000108 public final String provisioningResponse;
Erik Klinee0f34032018-02-28 15:01:35 +0900109
markchien986750b2019-12-06 15:24:53 +0800110 public final int activeDataSubId;
markchien0b595072019-01-08 23:52:21 +0800111
junyulaiaea13ae2020-04-30 15:21:55 +0800112 private final int mOffloadPollInterval;
Nucca Chen1c63ba32020-06-17 07:03:57 +0000113 // TODO: Add to TetheringConfigurationParcel if required.
114 private final boolean mEnableBpfOffload;
junyulaiaea13ae2020-04-30 15:21:55 +0800115
markchien0b595072019-01-08 23:52:21 +0800116 public TetheringConfiguration(Context ctx, SharedLog log, int id) {
Erik Kline6bd74532017-05-19 10:10:41 +0900117 final SharedLog configLog = log.forSubComponent("config");
118
markchien986750b2019-12-06 15:24:53 +0800119 activeDataSubId = id;
120 Resources res = getResources(ctx, activeDataSubId);
markchien0b595072019-01-08 23:52:21 +0800121
markchienda4519a2020-01-14 12:46:53 +0800122 tetherableUsbRegexs = getResourceStringArray(res, R.array.config_tether_usb_regexs);
Milim Lee31ef4c02019-10-17 05:02:33 +0900123 tetherableNcmRegexs = getResourceStringArray(res, R.array.config_tether_ncm_regexs);
Erik Kline9e225542017-06-08 17:48:48 +0900124 // TODO: Evaluate deleting this altogether now that Wi-Fi always passes
125 // us an interface name. Careful consideration needs to be given to
126 // implications for Settings and for provisioning checks.
markchienda4519a2020-01-14 12:46:53 +0800127 tetherableWifiRegexs = getResourceStringArray(res, R.array.config_tether_wifi_regexs);
128 tetherableWifiP2pRegexs = getResourceStringArray(
129 res, R.array.config_tether_wifi_p2p_regexs);
130 tetherableBluetoothRegexs = getResourceStringArray(
131 res, R.array.config_tether_bluetooth_regexs);
Erik Kline79868f82017-01-21 14:33:56 +0900132
markchien986750b2019-12-06 15:24:53 +0800133 isDunRequired = checkDunRequired(ctx);
Erik Kline6bd74532017-05-19 10:10:41 +0900134
markchienda4519a2020-01-14 12:46:53 +0800135 chooseUpstreamAutomatically = getResourceBoolean(
Treehugger Robotddc32f62020-05-14 16:33:30 +0000136 res, R.bool.config_tether_upstream_automatic, false /** defaultValue */);
markchiendb3a2362018-10-05 12:36:08 +0800137 preferredUpstreamIfaceTypes = getUpstreamIfaceTypes(res, isDunRequired);
Erik Kline79868f82017-01-21 14:33:56 +0900138
markchien0b595072019-01-08 23:52:21 +0800139 legacyDhcpRanges = getLegacyDhcpRanges(res);
Erik Kline79868f82017-01-21 14:33:56 +0900140 defaultIPv4DNS = copy(DEFAULT_IPV4_DNS);
Nucca Chen1c63ba32020-06-17 07:03:57 +0000141 mEnableBpfOffload = getEnableBpfOffload(res);
markchien2dfee022020-01-13 16:09:42 +0800142 enableLegacyDhcpServer = getEnableLegacyDhcpServer(res);
Erik Kline6bd74532017-05-19 10:10:41 +0900143
markchienda4519a2020-01-14 12:46:53 +0800144 provisioningApp = getResourceStringArray(res, R.array.config_mobile_hotspot_provision_app);
Mark Chien5b0fdf62020-06-12 17:35:18 +0000145 provisioningAppNoUi = getResourceString(res,
146 R.string.config_mobile_hotspot_provision_app_no_ui);
markchien3b519632018-09-07 16:19:12 +0800147 provisioningCheckPeriod = getResourceInteger(res,
markchienda4519a2020-01-14 12:46:53 +0800148 R.integer.config_mobile_hotspot_provision_check_period,
markchien3b519632018-09-07 16:19:12 +0800149 0 /* No periodic re-check */);
Mark Chien5b0fdf62020-06-12 17:35:18 +0000150 provisioningResponse = getResourceString(res,
151 R.string.config_mobile_hotspot_provision_response);
Erik Klinee0f34032018-02-28 15:01:35 +0900152
junyulaiaea13ae2020-04-30 15:21:55 +0800153 mOffloadPollInterval = getResourceInteger(res,
154 R.integer.config_tether_offload_poll_interval,
155 DEFAULT_TETHER_OFFLOAD_POLL_INTERVAL_MS);
156
Erik Kline6bd74532017-05-19 10:10:41 +0900157 configLog.log(toString());
Erik Kline79868f82017-01-21 14:33:56 +0900158 }
159
markchiena6ba54d2019-09-03 15:58:06 +0800160 /** Check whether input interface belong to usb.*/
Erik Kline79868f82017-01-21 14:33:56 +0900161 public boolean isUsb(String iface) {
162 return matchesDownstreamRegexs(iface, tetherableUsbRegexs);
163 }
164
markchiena6ba54d2019-09-03 15:58:06 +0800165 /** Check whether input interface belong to wifi.*/
Erik Kline79868f82017-01-21 14:33:56 +0900166 public boolean isWifi(String iface) {
167 return matchesDownstreamRegexs(iface, tetherableWifiRegexs);
168 }
169
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800170 /** Check whether this interface is Wifi P2P interface. */
171 public boolean isWifiP2p(String iface) {
172 return matchesDownstreamRegexs(iface, tetherableWifiP2pRegexs);
173 }
174
markchiena6ba54d2019-09-03 15:58:06 +0800175 /** Check whether using legacy mode for wifi P2P. */
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800176 public boolean isWifiP2pLegacyTetheringMode() {
177 return (tetherableWifiP2pRegexs == null || tetherableWifiP2pRegexs.length == 0);
178 }
179
markchiena6ba54d2019-09-03 15:58:06 +0800180 /** Check whether input interface belong to bluetooth.*/
Erik Kline79868f82017-01-21 14:33:56 +0900181 public boolean isBluetooth(String iface) {
182 return matchesDownstreamRegexs(iface, tetherableBluetoothRegexs);
183 }
184
Milim Lee31ef4c02019-10-17 05:02:33 +0900185 /** Check if interface is ncm */
186 public boolean isNcm(String iface) {
187 return matchesDownstreamRegexs(iface, tetherableNcmRegexs);
188 }
189
markchiena6ba54d2019-09-03 15:58:06 +0800190 /** Check whether no ui entitlement application is available.*/
Erik Klinee0f34032018-02-28 15:01:35 +0900191 public boolean hasMobileHotspotProvisionApp() {
192 return !TextUtils.isEmpty(provisioningAppNoUi);
193 }
194
markchiena6ba54d2019-09-03 15:58:06 +0800195 /** Does the dumping.*/
Erik Kline9db1b542017-03-16 14:10:27 +0900196 public void dump(PrintWriter pw) {
markchien986750b2019-12-06 15:24:53 +0800197 pw.print("activeDataSubId: ");
198 pw.println(activeDataSubId);
markchien0b595072019-01-08 23:52:21 +0800199
Erik Kline9db1b542017-03-16 14:10:27 +0900200 dumpStringArray(pw, "tetherableUsbRegexs", tetherableUsbRegexs);
201 dumpStringArray(pw, "tetherableWifiRegexs", tetherableWifiRegexs);
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800202 dumpStringArray(pw, "tetherableWifiP2pRegexs", tetherableWifiP2pRegexs);
Erik Kline9db1b542017-03-16 14:10:27 +0900203 dumpStringArray(pw, "tetherableBluetoothRegexs", tetherableBluetoothRegexs);
Milim Lee31ef4c02019-10-17 05:02:33 +0900204 dumpStringArray(pw, "tetherableNcmRegexs", tetherableNcmRegexs);
Erik Kline9db1b542017-03-16 14:10:27 +0900205
206 pw.print("isDunRequired: ");
207 pw.println(isDunRequired);
208
Erik Kline72302902018-06-14 17:36:40 +0900209 pw.print("chooseUpstreamAutomatically: ");
210 pw.println(chooseUpstreamAutomatically);
markchien87d3f7d2020-01-08 20:58:23 +0800211 pw.print("legacyPreredUpstreamIfaceTypes: ");
212 pw.println(Arrays.toString(toIntArray(preferredUpstreamIfaceTypes)));
Erik Kline9db1b542017-03-16 14:10:27 +0900213
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +0900214 dumpStringArray(pw, "legacyDhcpRanges", legacyDhcpRanges);
Erik Kline9db1b542017-03-16 14:10:27 +0900215 dumpStringArray(pw, "defaultIPv4DNS", defaultIPv4DNS);
Erik Klinee0f34032018-02-28 15:01:35 +0900216
junyulaiaea13ae2020-04-30 15:21:55 +0800217 pw.print("offloadPollInterval: ");
218 pw.println(mOffloadPollInterval);
219
Erik Klinee0f34032018-02-28 15:01:35 +0900220 dumpStringArray(pw, "provisioningApp", provisioningApp);
221 pw.print("provisioningAppNoUi: ");
222 pw.println(provisioningAppNoUi);
Remi NGUYEN VAN9865cc12018-08-30 16:49:52 +0900223
Nucca Chen95e0bac2020-05-12 11:34:28 +0000224 pw.print("enableBpfOffload: ");
Nucca Chen1c63ba32020-06-17 07:03:57 +0000225 pw.println(mEnableBpfOffload);
Nucca Chen95e0bac2020-05-12 11:34:28 +0000226
Remi NGUYEN VAN9865cc12018-08-30 16:49:52 +0900227 pw.print("enableLegacyDhcpServer: ");
228 pw.println(enableLegacyDhcpServer);
Erik Kline9db1b542017-03-16 14:10:27 +0900229 }
230
markchiena6ba54d2019-09-03 15:58:06 +0800231 /** Returns the string representation of this object.*/
Erik Kline6bd74532017-05-19 10:10:41 +0900232 public String toString() {
233 final StringJoiner sj = new StringJoiner(" ");
markchien986750b2019-12-06 15:24:53 +0800234 sj.add(String.format("activeDataSubId:%d", activeDataSubId));
Erik Kline6bd74532017-05-19 10:10:41 +0900235 sj.add(String.format("tetherableUsbRegexs:%s", makeString(tetherableUsbRegexs)));
236 sj.add(String.format("tetherableWifiRegexs:%s", makeString(tetherableWifiRegexs)));
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800237 sj.add(String.format("tetherableWifiP2pRegexs:%s", makeString(tetherableWifiP2pRegexs)));
Erik Kline6bd74532017-05-19 10:10:41 +0900238 sj.add(String.format("tetherableBluetoothRegexs:%s",
239 makeString(tetherableBluetoothRegexs)));
240 sj.add(String.format("isDunRequired:%s", isDunRequired));
Erik Kline72302902018-06-14 17:36:40 +0900241 sj.add(String.format("chooseUpstreamAutomatically:%s", chooseUpstreamAutomatically));
junyulaiaea13ae2020-04-30 15:21:55 +0800242 sj.add(String.format("offloadPollInterval:%d", mOffloadPollInterval));
Erik Kline6bd74532017-05-19 10:10:41 +0900243 sj.add(String.format("preferredUpstreamIfaceTypes:%s",
markchien87d3f7d2020-01-08 20:58:23 +0800244 toIntArray(preferredUpstreamIfaceTypes)));
Erik Klinee0f34032018-02-28 15:01:35 +0900245 sj.add(String.format("provisioningApp:%s", makeString(provisioningApp)));
246 sj.add(String.format("provisioningAppNoUi:%s", provisioningAppNoUi));
Nucca Chen1c63ba32020-06-17 07:03:57 +0000247 sj.add(String.format("enableBpfOffload:%s", mEnableBpfOffload));
Remi NGUYEN VAN9865cc12018-08-30 16:49:52 +0900248 sj.add(String.format("enableLegacyDhcpServer:%s", enableLegacyDhcpServer));
Erik Kline6bd74532017-05-19 10:10:41 +0900249 return String.format("TetheringConfiguration{%s}", sj.toString());
250 }
251
Erik Kline9db1b542017-03-16 14:10:27 +0900252 private static void dumpStringArray(PrintWriter pw, String label, String[] values) {
253 pw.print(label);
254 pw.print(": ");
255
256 if (values != null) {
257 final StringJoiner sj = new StringJoiner(", ", "[", "]");
markchiena6ba54d2019-09-03 15:58:06 +0800258 for (String value : values) sj.add(value);
Erik Kline9db1b542017-03-16 14:10:27 +0900259 pw.print(sj.toString());
260 } else {
261 pw.print("null");
262 }
263
264 pw.println();
265 }
266
Erik Kline6bd74532017-05-19 10:10:41 +0900267 private static String makeString(String[] strings) {
Erik Klinee0f34032018-02-28 15:01:35 +0900268 if (strings == null) return "null";
Erik Kline6bd74532017-05-19 10:10:41 +0900269 final StringJoiner sj = new StringJoiner(",", "[", "]");
270 for (String s : strings) sj.add(s);
271 return sj.toString();
272 }
273
markchiendb3a2362018-10-05 12:36:08 +0800274 /** Check whether dun is required. */
markchien986750b2019-12-06 15:24:53 +0800275 public static boolean checkDunRequired(Context ctx) {
Erik Kline54f2f372017-05-15 21:11:47 +0900276 final TelephonyManager tm = (TelephonyManager) ctx.getSystemService(TELEPHONY_SERVICE);
markchien986750b2019-12-06 15:24:53 +0800277 // TelephonyManager would uses the active data subscription, which should be the one used
278 // by tethering.
279 return (tm != null) ? tm.isTetheringApnRequired() : false;
Erik Kline79868f82017-01-21 14:33:56 +0900280 }
281
junyulaiaea13ae2020-04-30 15:21:55 +0800282 public int getOffloadPollInterval() {
283 return mOffloadPollInterval;
284 }
285
Nucca Chen1c63ba32020-06-17 07:03:57 +0000286 public boolean isBpfOffloadEnabled() {
287 return mEnableBpfOffload;
288 }
289
markchiendb3a2362018-10-05 12:36:08 +0800290 private static Collection<Integer> getUpstreamIfaceTypes(Resources res, boolean dunRequired) {
markchienda4519a2020-01-14 12:46:53 +0800291 final int[] ifaceTypes = res.getIntArray(R.array.config_tether_upstream_types);
Erik Kline79868f82017-01-21 14:33:56 +0900292 final ArrayList<Integer> upstreamIfaceTypes = new ArrayList<>(ifaceTypes.length);
293 for (int i : ifaceTypes) {
294 switch (i) {
295 case TYPE_MOBILE:
296 case TYPE_MOBILE_HIPRI:
markchiendb3a2362018-10-05 12:36:08 +0800297 if (dunRequired) continue;
Erik Kline79868f82017-01-21 14:33:56 +0900298 break;
299 case TYPE_MOBILE_DUN:
markchiendb3a2362018-10-05 12:36:08 +0800300 if (!dunRequired) continue;
Erik Kline79868f82017-01-21 14:33:56 +0900301 break;
302 }
303 upstreamIfaceTypes.add(i);
304 }
305
306 // Fix up upstream interface types for DUN or mobile. NOTE: independent
markchiendb3a2362018-10-05 12:36:08 +0800307 // of the value of |dunRequired|, cell data of one form or another is
Erik Kline79868f82017-01-21 14:33:56 +0900308 // *always* an upstream, regardless of the upstream interface types
309 // specified by configuration resources.
markchiendb3a2362018-10-05 12:36:08 +0800310 if (dunRequired) {
Erik Kline1e543512017-03-09 11:44:11 +0900311 appendIfNotPresent(upstreamIfaceTypes, TYPE_MOBILE_DUN);
Jayachandran C58059822017-05-17 23:53:59 -0700312 } else {
Jayachandran C58059822017-05-17 23:53:59 -0700313 // Do not modify if a cellular interface type is already present in the
314 // upstream interface types. Add TYPE_MOBILE and TYPE_MOBILE_HIPRI if no
315 // cellular interface types are found in the upstream interface types.
markchiendb3a2362018-10-05 12:36:08 +0800316 // This preserves backwards compatibility and prevents the DUN and default
317 // mobile types incorrectly appearing together, which could happen on
318 // previous releases in the common case where checkDunRequired returned
319 // DUN_UNSPECIFIED.
320 if (!containsOneOf(upstreamIfaceTypes, TYPE_MOBILE, TYPE_MOBILE_HIPRI)) {
Jayachandran C58059822017-05-17 23:53:59 -0700321 upstreamIfaceTypes.add(TYPE_MOBILE);
322 upstreamIfaceTypes.add(TYPE_MOBILE_HIPRI);
323 }
Erik Kline79868f82017-01-21 14:33:56 +0900324 }
325
Erik Kline1e543512017-03-09 11:44:11 +0900326 // Always make sure our good friend Ethernet is present.
327 // TODO: consider unilaterally forcing this at the front.
328 prependIfNotPresent(upstreamIfaceTypes, TYPE_ETHERNET);
329
Erik Kline79868f82017-01-21 14:33:56 +0900330 return upstreamIfaceTypes;
331 }
332
333 private static boolean matchesDownstreamRegexs(String iface, String[] regexs) {
334 for (String regex : regexs) {
335 if (iface.matches(regex)) return true;
336 }
337 return false;
338 }
339
markchien0b595072019-01-08 23:52:21 +0800340 private static String[] getLegacyDhcpRanges(Resources res) {
markchienda4519a2020-01-14 12:46:53 +0800341 final String[] fromResource = getResourceStringArray(res, R.array.config_tether_dhcp_range);
Erik Kline79868f82017-01-21 14:33:56 +0900342 if ((fromResource.length > 0) && (fromResource.length % 2 == 0)) {
343 return fromResource;
344 }
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +0900345 return copy(LEGACY_DHCP_DEFAULT_RANGE);
Erik Kline79868f82017-01-21 14:33:56 +0900346 }
347
Mark Chien5b0fdf62020-06-12 17:35:18 +0000348 private static String getResourceString(Resources res, final int resId) {
Erik Klinee0f34032018-02-28 15:01:35 +0900349 try {
Mark Chien5b0fdf62020-06-12 17:35:18 +0000350 return res.getString(resId);
Erik Klinee0f34032018-02-28 15:01:35 +0900351 } catch (Resources.NotFoundException e) {
352 return "";
353 }
354 }
355
Nucca Chen95e0bac2020-05-12 11:34:28 +0000356 private static boolean getResourceBoolean(Resources res, int resId, boolean defaultValue) {
Erik Kline72302902018-06-14 17:36:40 +0900357 try {
markchien0b595072019-01-08 23:52:21 +0800358 return res.getBoolean(resId);
Erik Kline72302902018-06-14 17:36:40 +0900359 } catch (Resources.NotFoundException e404) {
Nucca Chen95e0bac2020-05-12 11:34:28 +0000360 return defaultValue;
Erik Kline72302902018-06-14 17:36:40 +0900361 }
362 }
363
markchien0b595072019-01-08 23:52:21 +0800364 private static String[] getResourceStringArray(Resources res, int resId) {
Erik Klinee0f34032018-02-28 15:01:35 +0900365 try {
markchien0b595072019-01-08 23:52:21 +0800366 final String[] strArray = res.getStringArray(resId);
Erik Klinee0f34032018-02-28 15:01:35 +0900367 return (strArray != null) ? strArray : EMPTY_STRING_ARRAY;
368 } catch (Resources.NotFoundException e404) {
369 return EMPTY_STRING_ARRAY;
370 }
371 }
372
markchien3b519632018-09-07 16:19:12 +0800373 private static int getResourceInteger(Resources res, int resId, int defaultValue) {
374 try {
375 return res.getInteger(resId);
376 } catch (Resources.NotFoundException e404) {
377 return defaultValue;
378 }
379 }
380
Nucca Chen95e0bac2020-05-12 11:34:28 +0000381 private boolean getEnableBpfOffload(final Resources res) {
382 // Get BPF offload config
383 // Priority 1: Device config
384 // Priority 2: Resource config
385 // Priority 3: Default value
Treehugger Robotddc32f62020-05-14 16:33:30 +0000386 final boolean defaultValue = getResourceBoolean(
Nucca Chen95e0bac2020-05-12 11:34:28 +0000387 res, R.bool.config_tether_enable_bpf_offload, true /** default value */);
388
Treehugger Robotddc32f62020-05-14 16:33:30 +0000389 return getDeviceConfigBoolean(OVERRIDE_TETHER_ENABLE_BPF_OFFLOAD, defaultValue);
Nucca Chen95e0bac2020-05-12 11:34:28 +0000390 }
391
markchien2dfee022020-01-13 16:09:42 +0800392 private boolean getEnableLegacyDhcpServer(final Resources res) {
Nucca Chen95e0bac2020-05-12 11:34:28 +0000393 return getResourceBoolean(
Treehugger Robotddc32f62020-05-14 16:33:30 +0000394 res, R.bool.config_tether_enable_legacy_dhcp_server, false /** defaultValue */)
395 || getDeviceConfigBoolean(
396 TETHER_ENABLE_LEGACY_DHCP_SERVER, false /** defaultValue */);
397 }
398
399 private boolean getDeviceConfigBoolean(final String name, final boolean defaultValue) {
400 // Due to the limitation of static mock for testing, using #getDeviceConfigProperty instead
401 // of DeviceConfig#getBoolean. If using #getBoolean here, the test can't know that the
402 // returned boolean value comes from device config or default value (because of null
403 // property string). See the test case testBpfOffload{*} in TetheringConfigurationTest.java.
404 final String value = getDeviceConfigProperty(name);
405 return value != null ? Boolean.parseBoolean(value) : defaultValue;
markchien2dfee022020-01-13 16:09:42 +0800406 }
407
408 @VisibleForTesting
Treehugger Robotddc32f62020-05-14 16:33:30 +0000409 protected String getDeviceConfigProperty(String name) {
410 return DeviceConfig.getProperty(NAMESPACE_CONNECTIVITY, name);
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +0900411 }
412
markchien0b595072019-01-08 23:52:21 +0800413 private Resources getResources(Context ctx, int subId) {
414 if (subId != SubscriptionManager.INVALID_SUBSCRIPTION_ID) {
415 return getResourcesForSubIdWrapper(ctx, subId);
416 } else {
417 return ctx.getResources();
418 }
419 }
420
421 @VisibleForTesting
422 protected Resources getResourcesForSubIdWrapper(Context ctx, int subId) {
423 return SubscriptionManager.getResourcesForSubId(ctx, subId);
424 }
425
Erik Kline79868f82017-01-21 14:33:56 +0900426 private static String[] copy(String[] strarray) {
427 return Arrays.copyOf(strarray, strarray.length);
428 }
Erik Kline1e543512017-03-09 11:44:11 +0900429
430 private static void prependIfNotPresent(ArrayList<Integer> list, int value) {
431 if (list.contains(value)) return;
432 list.add(0, value);
433 }
434
435 private static void appendIfNotPresent(ArrayList<Integer> list, int value) {
436 if (list.contains(value)) return;
437 list.add(value);
438 }
439
440 private static boolean containsOneOf(ArrayList<Integer> list, Integer... values) {
441 for (Integer value : values) {
442 if (list.contains(value)) return true;
443 }
444 return false;
445 }
markchien0df2ebc42019-09-30 14:40:57 +0800446
markchien87d3f7d2020-01-08 20:58:23 +0800447 private static int[] toIntArray(Collection<Integer> values) {
448 final int[] result = new int[values.size()];
449 int index = 0;
450 for (Integer value : values) {
451 result[index++] = value;
452 }
453 return result;
454 }
455
markchien0df2ebc42019-09-30 14:40:57 +0800456 /**
457 * Convert this TetheringConfiguration to a TetheringConfigurationParcel.
458 */
459 public TetheringConfigurationParcel toStableParcelable() {
460 final TetheringConfigurationParcel parcel = new TetheringConfigurationParcel();
markchien986750b2019-12-06 15:24:53 +0800461 parcel.subId = activeDataSubId;
markchien0df2ebc42019-09-30 14:40:57 +0800462 parcel.tetherableUsbRegexs = tetherableUsbRegexs;
463 parcel.tetherableWifiRegexs = tetherableWifiRegexs;
464 parcel.tetherableBluetoothRegexs = tetherableBluetoothRegexs;
465 parcel.isDunRequired = isDunRequired;
466 parcel.chooseUpstreamAutomatically = chooseUpstreamAutomatically;
467
markchien87d3f7d2020-01-08 20:58:23 +0800468 parcel.preferredUpstreamIfaceTypes = toIntArray(preferredUpstreamIfaceTypes);
markchien0df2ebc42019-09-30 14:40:57 +0800469
470 parcel.legacyDhcpRanges = legacyDhcpRanges;
471 parcel.defaultIPv4DNS = defaultIPv4DNS;
472 parcel.enableLegacyDhcpServer = enableLegacyDhcpServer;
473 parcel.provisioningApp = provisioningApp;
474 parcel.provisioningAppNoUi = provisioningAppNoUi;
475 parcel.provisioningCheckPeriod = provisioningCheckPeriod;
476 return parcel;
477 }
Erik Kline79868f82017-01-21 14:33:56 +0900478}