blob: 91a6e29a05da3227f6f3474a73c7ebe8ee2c9104 [file] [log] [blame]
Erik Kline79868f82017-01-21 14:33:56 +09001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
markchien503be612020-04-12 21:41:29 +080017package com.android.networkstack.tethering;
Erik Kline79868f82017-01-21 14:33:56 +090018
Erik Kline54f2f372017-05-15 21:11:47 +090019import static android.content.Context.TELEPHONY_SERVICE;
Erik Kline1e543512017-03-09 11:44:11 +090020import static android.net.ConnectivityManager.TYPE_ETHERNET;
Erik Kline79868f82017-01-21 14:33:56 +090021import static android.net.ConnectivityManager.TYPE_MOBILE;
22import static android.net.ConnectivityManager.TYPE_MOBILE_DUN;
23import static android.net.ConnectivityManager.TYPE_MOBILE_HIPRI;
markchien2dfee022020-01-13 16:09:42 +080024import static android.provider.DeviceConfig.NAMESPACE_CONNECTIVITY;
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +090025
Erik Kline79868f82017-01-21 14:33:56 +090026import android.content.Context;
27import android.content.res.Resources;
markchien0df2ebc42019-09-30 14:40:57 +080028import android.net.TetheringConfigurationParcel;
Erik Klinee93ed612018-04-10 07:01:16 +000029import android.net.util.SharedLog;
markchien2dfee022020-01-13 16:09:42 +080030import android.provider.DeviceConfig;
markchien0b595072019-01-08 23:52:21 +080031import android.telephony.SubscriptionManager;
Erik Klinee0f34032018-02-28 15:01:35 +090032import android.telephony.TelephonyManager;
33import android.text.TextUtils;
Erik Kline79868f82017-01-21 14:33:56 +090034
Chalard Jean918a68b2018-01-19 17:00:47 +090035import com.android.internal.annotations.VisibleForTesting;
36
Erik Kline9db1b542017-03-16 14:10:27 +090037import java.io.PrintWriter;
Erik Kline79868f82017-01-21 14:33:56 +090038import java.util.ArrayList;
39import java.util.Arrays;
40import java.util.Collection;
Erik Kline9db1b542017-03-16 14:10:27 +090041import java.util.StringJoiner;
Erik Kline79868f82017-01-21 14:33:56 +090042
43
44/**
45 * A utility class to encapsulate the various tethering configuration elements.
46 *
47 * This configuration data includes elements describing upstream properties
48 * (preferred and required types of upstream connectivity as well as default
49 * DNS servers to use if none are available) and downstream properties (such
50 * as regular expressions use to match suitable downstream interfaces and the
51 * DHCPv4 ranges to use).
52 *
53 * @hide
54 */
55public class TetheringConfiguration {
56 private static final String TAG = TetheringConfiguration.class.getSimpleName();
57
Erik Klinee0f34032018-02-28 15:01:35 +090058 private static final String[] EMPTY_STRING_ARRAY = new String[0];
59
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +090060 // Default ranges used for the legacy DHCP server.
Erik Kline79868f82017-01-21 14:33:56 +090061 // USB is 192.168.42.1 and 255.255.255.0
62 // Wifi is 192.168.43.1 and 255.255.255.0
63 // BT is limited to max default of 5 connections. 192.168.44.1 to 192.168.48.1
64 // with 255.255.255.0
65 // P2P is 192.168.49.1 and 255.255.255.0
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +090066 private static final String[] LEGACY_DHCP_DEFAULT_RANGE = {
Erik Kline79868f82017-01-21 14:33:56 +090067 "192.168.42.2", "192.168.42.254", "192.168.43.2", "192.168.43.254",
68 "192.168.44.2", "192.168.44.254", "192.168.45.2", "192.168.45.254",
69 "192.168.46.2", "192.168.46.254", "192.168.47.2", "192.168.47.254",
70 "192.168.48.2", "192.168.48.254", "192.168.49.2", "192.168.49.254",
71 };
72
markchiena6ba54d2019-09-03 15:58:06 +080073 private static final String[] DEFAULT_IPV4_DNS = {"8.8.4.4", "8.8.8.8"};
Erik Kline79868f82017-01-21 14:33:56 +090074
markchien2dfee022020-01-13 16:09:42 +080075 /**
Nucca Chen95e0bac2020-05-12 11:34:28 +000076 * Override enabling BPF offload configuration for tethering.
77 */
78 public static final String OVERRIDE_TETHER_ENABLE_BPF_OFFLOAD =
79 "override_tether_enable_bpf_offload";
80
81 /**
markchien2dfee022020-01-13 16:09:42 +080082 * Use the old dnsmasq DHCP server for tethering instead of the framework implementation.
83 */
84 public static final String TETHER_ENABLE_LEGACY_DHCP_SERVER =
85 "tether_enable_legacy_dhcp_server";
86
junyulaiaea13ae2020-04-30 15:21:55 +080087 /**
88 * Default value that used to periodic polls tether offload stats from tethering offload HAL
89 * to make the data warnings work.
90 */
91 public static final int DEFAULT_TETHER_OFFLOAD_POLL_INTERVAL_MS = 5000;
92
Erik Kline79868f82017-01-21 14:33:56 +090093 public final String[] tetherableUsbRegexs;
94 public final String[] tetherableWifiRegexs;
Jimmy Chenbcd86d02019-07-15 18:03:23 +080095 public final String[] tetherableWifiP2pRegexs;
Erik Kline79868f82017-01-21 14:33:56 +090096 public final String[] tetherableBluetoothRegexs;
Milim Lee31ef4c02019-10-17 05:02:33 +090097 public final String[] tetherableNcmRegexs;
Erik Kline79868f82017-01-21 14:33:56 +090098 public final boolean isDunRequired;
Erik Kline72302902018-06-14 17:36:40 +090099 public final boolean chooseUpstreamAutomatically;
Erik Kline79868f82017-01-21 14:33:56 +0900100 public final Collection<Integer> preferredUpstreamIfaceTypes;
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +0900101 public final String[] legacyDhcpRanges;
Erik Kline79868f82017-01-21 14:33:56 +0900102 public final String[] defaultIPv4DNS;
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +0900103 public final boolean enableLegacyDhcpServer;
Nucca Chen95e0bac2020-05-12 11:34:28 +0000104 // TODO: Add to TetheringConfigurationParcel if required.
105 public final boolean enableBpfOffload;
Erik Kline79868f82017-01-21 14:33:56 +0900106
Erik Klinee0f34032018-02-28 15:01:35 +0900107 public final String[] provisioningApp;
108 public final String provisioningAppNoUi;
markchien3b519632018-09-07 16:19:12 +0800109 public final int provisioningCheckPeriod;
Erik Klinee0f34032018-02-28 15:01:35 +0900110
markchien986750b2019-12-06 15:24:53 +0800111 public final int activeDataSubId;
markchien0b595072019-01-08 23:52:21 +0800112
junyulaiaea13ae2020-04-30 15:21:55 +0800113 private final int mOffloadPollInterval;
114
markchien0b595072019-01-08 23:52:21 +0800115 public TetheringConfiguration(Context ctx, SharedLog log, int id) {
Erik Kline6bd74532017-05-19 10:10:41 +0900116 final SharedLog configLog = log.forSubComponent("config");
117
markchien986750b2019-12-06 15:24:53 +0800118 activeDataSubId = id;
119 Resources res = getResources(ctx, activeDataSubId);
markchien0b595072019-01-08 23:52:21 +0800120
markchienda4519a2020-01-14 12:46:53 +0800121 tetherableUsbRegexs = getResourceStringArray(res, R.array.config_tether_usb_regexs);
Milim Lee31ef4c02019-10-17 05:02:33 +0900122 tetherableNcmRegexs = getResourceStringArray(res, R.array.config_tether_ncm_regexs);
Erik Kline9e225542017-06-08 17:48:48 +0900123 // TODO: Evaluate deleting this altogether now that Wi-Fi always passes
124 // us an interface name. Careful consideration needs to be given to
125 // implications for Settings and for provisioning checks.
markchienda4519a2020-01-14 12:46:53 +0800126 tetherableWifiRegexs = getResourceStringArray(res, R.array.config_tether_wifi_regexs);
127 tetherableWifiP2pRegexs = getResourceStringArray(
128 res, R.array.config_tether_wifi_p2p_regexs);
129 tetherableBluetoothRegexs = getResourceStringArray(
130 res, R.array.config_tether_bluetooth_regexs);
Erik Kline79868f82017-01-21 14:33:56 +0900131
markchien986750b2019-12-06 15:24:53 +0800132 isDunRequired = checkDunRequired(ctx);
Erik Kline6bd74532017-05-19 10:10:41 +0900133
markchienda4519a2020-01-14 12:46:53 +0800134 chooseUpstreamAutomatically = getResourceBoolean(
Nucca Chen95e0bac2020-05-12 11:34:28 +0000135 res, R.bool.config_tether_upstream_automatic, false /** default value */);
markchiendb3a2362018-10-05 12:36:08 +0800136 preferredUpstreamIfaceTypes = getUpstreamIfaceTypes(res, isDunRequired);
Erik Kline79868f82017-01-21 14:33:56 +0900137
markchien0b595072019-01-08 23:52:21 +0800138 legacyDhcpRanges = getLegacyDhcpRanges(res);
Erik Kline79868f82017-01-21 14:33:56 +0900139 defaultIPv4DNS = copy(DEFAULT_IPV4_DNS);
Nucca Chen95e0bac2020-05-12 11:34:28 +0000140 enableBpfOffload = getEnableBpfOffload(res);
markchien2dfee022020-01-13 16:09:42 +0800141 enableLegacyDhcpServer = getEnableLegacyDhcpServer(res);
Erik Kline6bd74532017-05-19 10:10:41 +0900142
markchienda4519a2020-01-14 12:46:53 +0800143 provisioningApp = getResourceStringArray(res, R.array.config_mobile_hotspot_provision_app);
markchien0b595072019-01-08 23:52:21 +0800144 provisioningAppNoUi = getProvisioningAppNoUi(res);
markchien3b519632018-09-07 16:19:12 +0800145 provisioningCheckPeriod = getResourceInteger(res,
markchienda4519a2020-01-14 12:46:53 +0800146 R.integer.config_mobile_hotspot_provision_check_period,
markchien3b519632018-09-07 16:19:12 +0800147 0 /* No periodic re-check */);
Erik Klinee0f34032018-02-28 15:01:35 +0900148
junyulaiaea13ae2020-04-30 15:21:55 +0800149 mOffloadPollInterval = getResourceInteger(res,
150 R.integer.config_tether_offload_poll_interval,
151 DEFAULT_TETHER_OFFLOAD_POLL_INTERVAL_MS);
152
Erik Kline6bd74532017-05-19 10:10:41 +0900153 configLog.log(toString());
Erik Kline79868f82017-01-21 14:33:56 +0900154 }
155
markchiena6ba54d2019-09-03 15:58:06 +0800156 /** Check whether input interface belong to usb.*/
Erik Kline79868f82017-01-21 14:33:56 +0900157 public boolean isUsb(String iface) {
158 return matchesDownstreamRegexs(iface, tetherableUsbRegexs);
159 }
160
markchiena6ba54d2019-09-03 15:58:06 +0800161 /** Check whether input interface belong to wifi.*/
Erik Kline79868f82017-01-21 14:33:56 +0900162 public boolean isWifi(String iface) {
163 return matchesDownstreamRegexs(iface, tetherableWifiRegexs);
164 }
165
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800166 /** Check whether this interface is Wifi P2P interface. */
167 public boolean isWifiP2p(String iface) {
168 return matchesDownstreamRegexs(iface, tetherableWifiP2pRegexs);
169 }
170
markchiena6ba54d2019-09-03 15:58:06 +0800171 /** Check whether using legacy mode for wifi P2P. */
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800172 public boolean isWifiP2pLegacyTetheringMode() {
173 return (tetherableWifiP2pRegexs == null || tetherableWifiP2pRegexs.length == 0);
174 }
175
markchiena6ba54d2019-09-03 15:58:06 +0800176 /** Check whether input interface belong to bluetooth.*/
Erik Kline79868f82017-01-21 14:33:56 +0900177 public boolean isBluetooth(String iface) {
178 return matchesDownstreamRegexs(iface, tetherableBluetoothRegexs);
179 }
180
Milim Lee31ef4c02019-10-17 05:02:33 +0900181 /** Check if interface is ncm */
182 public boolean isNcm(String iface) {
183 return matchesDownstreamRegexs(iface, tetherableNcmRegexs);
184 }
185
markchiena6ba54d2019-09-03 15:58:06 +0800186 /** Check whether no ui entitlement application is available.*/
Erik Klinee0f34032018-02-28 15:01:35 +0900187 public boolean hasMobileHotspotProvisionApp() {
188 return !TextUtils.isEmpty(provisioningAppNoUi);
189 }
190
markchiena6ba54d2019-09-03 15:58:06 +0800191 /** Does the dumping.*/
Erik Kline9db1b542017-03-16 14:10:27 +0900192 public void dump(PrintWriter pw) {
markchien986750b2019-12-06 15:24:53 +0800193 pw.print("activeDataSubId: ");
194 pw.println(activeDataSubId);
markchien0b595072019-01-08 23:52:21 +0800195
Erik Kline9db1b542017-03-16 14:10:27 +0900196 dumpStringArray(pw, "tetherableUsbRegexs", tetherableUsbRegexs);
197 dumpStringArray(pw, "tetherableWifiRegexs", tetherableWifiRegexs);
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800198 dumpStringArray(pw, "tetherableWifiP2pRegexs", tetherableWifiP2pRegexs);
Erik Kline9db1b542017-03-16 14:10:27 +0900199 dumpStringArray(pw, "tetherableBluetoothRegexs", tetherableBluetoothRegexs);
Milim Lee31ef4c02019-10-17 05:02:33 +0900200 dumpStringArray(pw, "tetherableNcmRegexs", tetherableNcmRegexs);
Erik Kline9db1b542017-03-16 14:10:27 +0900201
202 pw.print("isDunRequired: ");
203 pw.println(isDunRequired);
204
Erik Kline72302902018-06-14 17:36:40 +0900205 pw.print("chooseUpstreamAutomatically: ");
206 pw.println(chooseUpstreamAutomatically);
markchien87d3f7d2020-01-08 20:58:23 +0800207 pw.print("legacyPreredUpstreamIfaceTypes: ");
208 pw.println(Arrays.toString(toIntArray(preferredUpstreamIfaceTypes)));
Erik Kline9db1b542017-03-16 14:10:27 +0900209
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +0900210 dumpStringArray(pw, "legacyDhcpRanges", legacyDhcpRanges);
Erik Kline9db1b542017-03-16 14:10:27 +0900211 dumpStringArray(pw, "defaultIPv4DNS", defaultIPv4DNS);
Erik Klinee0f34032018-02-28 15:01:35 +0900212
junyulaiaea13ae2020-04-30 15:21:55 +0800213 pw.print("offloadPollInterval: ");
214 pw.println(mOffloadPollInterval);
215
Erik Klinee0f34032018-02-28 15:01:35 +0900216 dumpStringArray(pw, "provisioningApp", provisioningApp);
217 pw.print("provisioningAppNoUi: ");
218 pw.println(provisioningAppNoUi);
Remi NGUYEN VAN9865cc12018-08-30 16:49:52 +0900219
Nucca Chen95e0bac2020-05-12 11:34:28 +0000220 pw.print("enableBpfOffload: ");
221 pw.println(enableBpfOffload);
222
Remi NGUYEN VAN9865cc12018-08-30 16:49:52 +0900223 pw.print("enableLegacyDhcpServer: ");
224 pw.println(enableLegacyDhcpServer);
Erik Kline9db1b542017-03-16 14:10:27 +0900225 }
226
markchiena6ba54d2019-09-03 15:58:06 +0800227 /** Returns the string representation of this object.*/
Erik Kline6bd74532017-05-19 10:10:41 +0900228 public String toString() {
229 final StringJoiner sj = new StringJoiner(" ");
markchien986750b2019-12-06 15:24:53 +0800230 sj.add(String.format("activeDataSubId:%d", activeDataSubId));
Erik Kline6bd74532017-05-19 10:10:41 +0900231 sj.add(String.format("tetherableUsbRegexs:%s", makeString(tetherableUsbRegexs)));
232 sj.add(String.format("tetherableWifiRegexs:%s", makeString(tetherableWifiRegexs)));
Jimmy Chenbcd86d02019-07-15 18:03:23 +0800233 sj.add(String.format("tetherableWifiP2pRegexs:%s", makeString(tetherableWifiP2pRegexs)));
Erik Kline6bd74532017-05-19 10:10:41 +0900234 sj.add(String.format("tetherableBluetoothRegexs:%s",
235 makeString(tetherableBluetoothRegexs)));
236 sj.add(String.format("isDunRequired:%s", isDunRequired));
Erik Kline72302902018-06-14 17:36:40 +0900237 sj.add(String.format("chooseUpstreamAutomatically:%s", chooseUpstreamAutomatically));
junyulaiaea13ae2020-04-30 15:21:55 +0800238 sj.add(String.format("offloadPollInterval:%d", mOffloadPollInterval));
Erik Kline6bd74532017-05-19 10:10:41 +0900239 sj.add(String.format("preferredUpstreamIfaceTypes:%s",
markchien87d3f7d2020-01-08 20:58:23 +0800240 toIntArray(preferredUpstreamIfaceTypes)));
Erik Klinee0f34032018-02-28 15:01:35 +0900241 sj.add(String.format("provisioningApp:%s", makeString(provisioningApp)));
242 sj.add(String.format("provisioningAppNoUi:%s", provisioningAppNoUi));
Nucca Chen95e0bac2020-05-12 11:34:28 +0000243 sj.add(String.format("enableBpfOffload:%s", enableBpfOffload));
Remi NGUYEN VAN9865cc12018-08-30 16:49:52 +0900244 sj.add(String.format("enableLegacyDhcpServer:%s", enableLegacyDhcpServer));
Erik Kline6bd74532017-05-19 10:10:41 +0900245 return String.format("TetheringConfiguration{%s}", sj.toString());
246 }
247
Erik Kline9db1b542017-03-16 14:10:27 +0900248 private static void dumpStringArray(PrintWriter pw, String label, String[] values) {
249 pw.print(label);
250 pw.print(": ");
251
252 if (values != null) {
253 final StringJoiner sj = new StringJoiner(", ", "[", "]");
markchiena6ba54d2019-09-03 15:58:06 +0800254 for (String value : values) sj.add(value);
Erik Kline9db1b542017-03-16 14:10:27 +0900255 pw.print(sj.toString());
256 } else {
257 pw.print("null");
258 }
259
260 pw.println();
261 }
262
Erik Kline6bd74532017-05-19 10:10:41 +0900263 private static String makeString(String[] strings) {
Erik Klinee0f34032018-02-28 15:01:35 +0900264 if (strings == null) return "null";
Erik Kline6bd74532017-05-19 10:10:41 +0900265 final StringJoiner sj = new StringJoiner(",", "[", "]");
266 for (String s : strings) sj.add(s);
267 return sj.toString();
268 }
269
markchiendb3a2362018-10-05 12:36:08 +0800270 /** Check whether dun is required. */
markchien986750b2019-12-06 15:24:53 +0800271 public static boolean checkDunRequired(Context ctx) {
Erik Kline54f2f372017-05-15 21:11:47 +0900272 final TelephonyManager tm = (TelephonyManager) ctx.getSystemService(TELEPHONY_SERVICE);
markchien986750b2019-12-06 15:24:53 +0800273 // TelephonyManager would uses the active data subscription, which should be the one used
274 // by tethering.
275 return (tm != null) ? tm.isTetheringApnRequired() : false;
Erik Kline79868f82017-01-21 14:33:56 +0900276 }
277
junyulaiaea13ae2020-04-30 15:21:55 +0800278 public int getOffloadPollInterval() {
279 return mOffloadPollInterval;
280 }
281
markchiendb3a2362018-10-05 12:36:08 +0800282 private static Collection<Integer> getUpstreamIfaceTypes(Resources res, boolean dunRequired) {
markchienda4519a2020-01-14 12:46:53 +0800283 final int[] ifaceTypes = res.getIntArray(R.array.config_tether_upstream_types);
Erik Kline79868f82017-01-21 14:33:56 +0900284 final ArrayList<Integer> upstreamIfaceTypes = new ArrayList<>(ifaceTypes.length);
285 for (int i : ifaceTypes) {
286 switch (i) {
287 case TYPE_MOBILE:
288 case TYPE_MOBILE_HIPRI:
markchiendb3a2362018-10-05 12:36:08 +0800289 if (dunRequired) continue;
Erik Kline79868f82017-01-21 14:33:56 +0900290 break;
291 case TYPE_MOBILE_DUN:
markchiendb3a2362018-10-05 12:36:08 +0800292 if (!dunRequired) continue;
Erik Kline79868f82017-01-21 14:33:56 +0900293 break;
294 }
295 upstreamIfaceTypes.add(i);
296 }
297
298 // Fix up upstream interface types for DUN or mobile. NOTE: independent
markchiendb3a2362018-10-05 12:36:08 +0800299 // of the value of |dunRequired|, cell data of one form or another is
Erik Kline79868f82017-01-21 14:33:56 +0900300 // *always* an upstream, regardless of the upstream interface types
301 // specified by configuration resources.
markchiendb3a2362018-10-05 12:36:08 +0800302 if (dunRequired) {
Erik Kline1e543512017-03-09 11:44:11 +0900303 appendIfNotPresent(upstreamIfaceTypes, TYPE_MOBILE_DUN);
Jayachandran C58059822017-05-17 23:53:59 -0700304 } else {
Jayachandran C58059822017-05-17 23:53:59 -0700305 // Do not modify if a cellular interface type is already present in the
306 // upstream interface types. Add TYPE_MOBILE and TYPE_MOBILE_HIPRI if no
307 // cellular interface types are found in the upstream interface types.
markchiendb3a2362018-10-05 12:36:08 +0800308 // This preserves backwards compatibility and prevents the DUN and default
309 // mobile types incorrectly appearing together, which could happen on
310 // previous releases in the common case where checkDunRequired returned
311 // DUN_UNSPECIFIED.
312 if (!containsOneOf(upstreamIfaceTypes, TYPE_MOBILE, TYPE_MOBILE_HIPRI)) {
Jayachandran C58059822017-05-17 23:53:59 -0700313 upstreamIfaceTypes.add(TYPE_MOBILE);
314 upstreamIfaceTypes.add(TYPE_MOBILE_HIPRI);
315 }
Erik Kline79868f82017-01-21 14:33:56 +0900316 }
317
Erik Kline1e543512017-03-09 11:44:11 +0900318 // Always make sure our good friend Ethernet is present.
319 // TODO: consider unilaterally forcing this at the front.
320 prependIfNotPresent(upstreamIfaceTypes, TYPE_ETHERNET);
321
Erik Kline79868f82017-01-21 14:33:56 +0900322 return upstreamIfaceTypes;
323 }
324
325 private static boolean matchesDownstreamRegexs(String iface, String[] regexs) {
326 for (String regex : regexs) {
327 if (iface.matches(regex)) return true;
328 }
329 return false;
330 }
331
markchien0b595072019-01-08 23:52:21 +0800332 private static String[] getLegacyDhcpRanges(Resources res) {
markchienda4519a2020-01-14 12:46:53 +0800333 final String[] fromResource = getResourceStringArray(res, R.array.config_tether_dhcp_range);
Erik Kline79868f82017-01-21 14:33:56 +0900334 if ((fromResource.length > 0) && (fromResource.length % 2 == 0)) {
335 return fromResource;
336 }
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +0900337 return copy(LEGACY_DHCP_DEFAULT_RANGE);
Erik Kline79868f82017-01-21 14:33:56 +0900338 }
339
markchien0b595072019-01-08 23:52:21 +0800340 private static String getProvisioningAppNoUi(Resources res) {
Erik Klinee0f34032018-02-28 15:01:35 +0900341 try {
markchienda4519a2020-01-14 12:46:53 +0800342 return res.getString(R.string.config_mobile_hotspot_provision_app_no_ui);
Erik Klinee0f34032018-02-28 15:01:35 +0900343 } catch (Resources.NotFoundException e) {
344 return "";
345 }
346 }
347
Nucca Chen95e0bac2020-05-12 11:34:28 +0000348 private static boolean getResourceBoolean(Resources res, int resId, boolean defaultValue) {
Erik Kline72302902018-06-14 17:36:40 +0900349 try {
markchien0b595072019-01-08 23:52:21 +0800350 return res.getBoolean(resId);
Erik Kline72302902018-06-14 17:36:40 +0900351 } catch (Resources.NotFoundException e404) {
Nucca Chen95e0bac2020-05-12 11:34:28 +0000352 return defaultValue;
Erik Kline72302902018-06-14 17:36:40 +0900353 }
354 }
355
markchien0b595072019-01-08 23:52:21 +0800356 private static String[] getResourceStringArray(Resources res, int resId) {
Erik Klinee0f34032018-02-28 15:01:35 +0900357 try {
markchien0b595072019-01-08 23:52:21 +0800358 final String[] strArray = res.getStringArray(resId);
Erik Klinee0f34032018-02-28 15:01:35 +0900359 return (strArray != null) ? strArray : EMPTY_STRING_ARRAY;
360 } catch (Resources.NotFoundException e404) {
361 return EMPTY_STRING_ARRAY;
362 }
363 }
364
markchien3b519632018-09-07 16:19:12 +0800365 private static int getResourceInteger(Resources res, int resId, int defaultValue) {
366 try {
367 return res.getInteger(resId);
368 } catch (Resources.NotFoundException e404) {
369 return defaultValue;
370 }
371 }
372
Nucca Chen95e0bac2020-05-12 11:34:28 +0000373 private boolean getEnableBpfOffload(final Resources res) {
374 // Get BPF offload config
375 // Priority 1: Device config
376 // Priority 2: Resource config
377 // Priority 3: Default value
378 final boolean resourceValue = getResourceBoolean(
379 res, R.bool.config_tether_enable_bpf_offload, true /** default value */);
380
381 // Due to the limitation of static mock for testing, using #getProperty directly instead
382 // of getDeviceConfigBoolean. getDeviceConfigBoolean is not invoked because it uses
383 // #getBoolean to get the boolean device config. The test can't know that the returned
384 // boolean value comes from device config or default value (because of null property
385 // string). Because the test would like to verify null property boolean string case,
386 // use DeviceConfig.getProperty here. See also the test case testBpfOffload{*} in
387 // TetheringConfigurationTest.java.
388 final String value = DeviceConfig.getProperty(
389 NAMESPACE_CONNECTIVITY, OVERRIDE_TETHER_ENABLE_BPF_OFFLOAD);
390 return (value != null) ? Boolean.parseBoolean(value) : resourceValue;
391 }
392
markchien2dfee022020-01-13 16:09:42 +0800393 private boolean getEnableLegacyDhcpServer(final Resources res) {
Nucca Chen95e0bac2020-05-12 11:34:28 +0000394 return getResourceBoolean(
395 res, R.bool.config_tether_enable_legacy_dhcp_server, false /** default value */)
markchien2dfee022020-01-13 16:09:42 +0800396 || getDeviceConfigBoolean(TETHER_ENABLE_LEGACY_DHCP_SERVER);
397 }
398
399 @VisibleForTesting
400 protected boolean getDeviceConfigBoolean(final String name) {
401 return DeviceConfig.getBoolean(NAMESPACE_CONNECTIVITY, name, false /** defaultValue */);
Remi NGUYEN VANe3bb5c52018-06-12 15:57:04 +0900402 }
403
markchien0b595072019-01-08 23:52:21 +0800404 private Resources getResources(Context ctx, int subId) {
405 if (subId != SubscriptionManager.INVALID_SUBSCRIPTION_ID) {
406 return getResourcesForSubIdWrapper(ctx, subId);
407 } else {
408 return ctx.getResources();
409 }
410 }
411
412 @VisibleForTesting
413 protected Resources getResourcesForSubIdWrapper(Context ctx, int subId) {
414 return SubscriptionManager.getResourcesForSubId(ctx, subId);
415 }
416
Erik Kline79868f82017-01-21 14:33:56 +0900417 private static String[] copy(String[] strarray) {
418 return Arrays.copyOf(strarray, strarray.length);
419 }
Erik Kline1e543512017-03-09 11:44:11 +0900420
421 private static void prependIfNotPresent(ArrayList<Integer> list, int value) {
422 if (list.contains(value)) return;
423 list.add(0, value);
424 }
425
426 private static void appendIfNotPresent(ArrayList<Integer> list, int value) {
427 if (list.contains(value)) return;
428 list.add(value);
429 }
430
431 private static boolean containsOneOf(ArrayList<Integer> list, Integer... values) {
432 for (Integer value : values) {
433 if (list.contains(value)) return true;
434 }
435 return false;
436 }
markchien0df2ebc42019-09-30 14:40:57 +0800437
markchien87d3f7d2020-01-08 20:58:23 +0800438 private static int[] toIntArray(Collection<Integer> values) {
439 final int[] result = new int[values.size()];
440 int index = 0;
441 for (Integer value : values) {
442 result[index++] = value;
443 }
444 return result;
445 }
446
markchien0df2ebc42019-09-30 14:40:57 +0800447 /**
448 * Convert this TetheringConfiguration to a TetheringConfigurationParcel.
449 */
450 public TetheringConfigurationParcel toStableParcelable() {
451 final TetheringConfigurationParcel parcel = new TetheringConfigurationParcel();
markchien986750b2019-12-06 15:24:53 +0800452 parcel.subId = activeDataSubId;
markchien0df2ebc42019-09-30 14:40:57 +0800453 parcel.tetherableUsbRegexs = tetherableUsbRegexs;
454 parcel.tetherableWifiRegexs = tetherableWifiRegexs;
455 parcel.tetherableBluetoothRegexs = tetherableBluetoothRegexs;
456 parcel.isDunRequired = isDunRequired;
457 parcel.chooseUpstreamAutomatically = chooseUpstreamAutomatically;
458
markchien87d3f7d2020-01-08 20:58:23 +0800459 parcel.preferredUpstreamIfaceTypes = toIntArray(preferredUpstreamIfaceTypes);
markchien0df2ebc42019-09-30 14:40:57 +0800460
461 parcel.legacyDhcpRanges = legacyDhcpRanges;
462 parcel.defaultIPv4DNS = defaultIPv4DNS;
463 parcel.enableLegacyDhcpServer = enableLegacyDhcpServer;
464 parcel.provisioningApp = provisioningApp;
465 parcel.provisioningAppNoUi = provisioningAppNoUi;
466 parcel.provisioningCheckPeriod = provisioningCheckPeriod;
467 return parcel;
468 }
Erik Kline79868f82017-01-21 14:33:56 +0900469}