blob: 37900b6fd09525a137d326f412fe1c7dcdb29a27 [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2006 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package android.app;
18
svetoslavganov75986cf2009-05-14 22:28:01 -070019import com.android.internal.policy.PolicyManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080020
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080021import android.content.BroadcastReceiver;
22import android.content.ComponentName;
23import android.content.ContentResolver;
24import android.content.Context;
25import android.content.ContextWrapper;
26import android.content.IContentProvider;
27import android.content.Intent;
28import android.content.IntentFilter;
Suchi Amalapurapu1ccac752009-06-12 10:09:58 -070029import android.content.IIntentReceiver;
30import android.content.IntentSender;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080031import android.content.ReceiverCallNotAllowedException;
32import android.content.ServiceConnection;
33import android.content.SharedPreferences;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080034import android.content.pm.ApplicationInfo;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080035import android.content.pm.IPackageManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080036import android.content.pm.PackageManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080037import android.content.res.AssetManager;
Dianne Hackborn5be8de32011-05-24 18:11:57 -070038import android.content.res.CompatibilityInfo;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080039import android.content.res.Resources;
Vasu Nori74f170f2010-06-01 18:06:18 -070040import android.database.DatabaseErrorHandler;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080041import android.database.sqlite.SQLiteDatabase;
42import android.database.sqlite.SQLiteDatabase.CursorFactory;
43import android.graphics.Bitmap;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080044import android.graphics.drawable.Drawable;
Mike Lockwoodb01e8bf2011-08-29 20:11:07 -040045import android.hardware.ISerialManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080046import android.hardware.SensorManager;
Mike Lockwoodb01e8bf2011-08-29 20:11:07 -040047import android.hardware.SerialManager;
Mike Lockwoodc4308f02011-03-01 08:04:54 -080048import android.hardware.usb.IUsbManager;
49import android.hardware.usb.UsbManager;
Bai Taoa58a8752010-07-13 15:32:16 +080050import android.location.CountryDetector;
51import android.location.ICountryDetector;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080052import android.location.ILocationManager;
53import android.location.LocationManager;
54import android.media.AudioManager;
55import android.net.ConnectivityManager;
56import android.net.IConnectivityManager;
Jeff Sharkey1a303952011-06-16 13:04:20 -070057import android.net.INetworkPolicyManager;
58import android.net.NetworkPolicyManager;
Irfan Sheriffc9b68512010-04-08 14:12:33 -070059import android.net.ThrottleManager;
60import android.net.IThrottleManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080061import android.net.Uri;
62import android.net.wifi.IWifiManager;
63import android.net.wifi.WifiManager;
repo sync55bc5f32011-06-24 14:23:07 -070064import android.net.wifi.p2p.IWifiP2pManager;
65import android.net.wifi.p2p.WifiP2pManager;
Nick Pelly50b4d8f2010-12-07 22:40:28 -080066import android.nfc.NfcManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080067import android.os.Binder;
68import android.os.Bundle;
Dan Egnorf18a01c2009-11-12 11:32:50 -080069import android.os.DropBoxManager;
Oscar Montemayor539d3c42010-01-29 15:27:00 -080070import android.os.Environment;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080071import android.os.FileUtils;
72import android.os.Handler;
73import android.os.IBinder;
74import android.os.IPowerManager;
svetoslavganov75986cf2009-05-14 22:28:01 -070075import android.os.Looper;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080076import android.os.PowerManager;
77import android.os.Process;
svetoslavganov75986cf2009-05-14 22:28:01 -070078import android.os.RemoteException;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080079import android.os.ServiceManager;
Amith Yamasani742a6712011-05-04 14:49:28 -070080import android.os.UserId;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080081import android.os.Vibrator;
San Mehatb1043402010-02-05 08:26:50 -080082import android.os.storage.StorageManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080083import android.telephony.TelephonyManager;
Dianne Hackborn9f531192010-08-04 17:48:03 -070084import android.content.ClipboardManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080085import android.util.AndroidRuntimeException;
86import android.util.Log;
87import android.view.ContextThemeWrapper;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080088import android.view.WindowManagerImpl;
svetoslavganov75986cf2009-05-14 22:28:01 -070089import android.view.accessibility.AccessibilityManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080090import android.view.inputmethod.InputMethodManager;
satok988323c2011-06-22 16:38:13 +090091import android.view.textservice.TextServicesManager;
Fred Quintana60307342009-03-24 22:48:12 -070092import android.accounts.AccountManager;
93import android.accounts.IAccountManager;
Dianne Hackborn87bba1e2010-02-26 17:25:54 -080094import android.app.admin.DevicePolicyManager;
Dan Egnorf18a01c2009-11-12 11:32:50 -080095import com.android.internal.os.IDropBoxManagerService;
Dan Egnor95240272009-10-27 18:23:39 -070096
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080097import java.io.File;
98import java.io.FileInputStream;
99import java.io.FileNotFoundException;
100import java.io.FileOutputStream;
101import java.io.IOException;
102import java.io.InputStream;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800103import java.util.ArrayList;
104import java.util.HashMap;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800105
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800106class ReceiverRestrictedContext extends ContextWrapper {
107 ReceiverRestrictedContext(Context base) {
108 super(base);
109 }
110
111 @Override
112 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter) {
113 return registerReceiver(receiver, filter, null, null);
114 }
115
116 @Override
117 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter,
118 String broadcastPermission, Handler scheduler) {
119 throw new ReceiverCallNotAllowedException(
120 "IntentReceiver components are not allowed to register to receive intents");
121 //ex.fillInStackTrace();
122 //Log.e("IntentReceiver", ex.getMessage(), ex);
123 //return mContext.registerReceiver(receiver, filter, broadcastPermission,
124 // scheduler);
125 }
126
127 @Override
128 public boolean bindService(Intent service, ServiceConnection conn, int flags) {
129 throw new ReceiverCallNotAllowedException(
130 "IntentReceiver components are not allowed to bind to services");
131 //ex.fillInStackTrace();
132 //Log.e("IntentReceiver", ex.getMessage(), ex);
133 //return mContext.bindService(service, interfaceName, conn, flags);
134 }
135}
136
137/**
Dianne Hackborn21556372010-02-04 16:34:40 -0800138 * Common implementation of Context API, which provides the base
139 * context object for Activity and other application components.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800140 */
Dianne Hackborn21556372010-02-04 16:34:40 -0800141class ContextImpl extends Context {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800142 private final static String TAG = "ApplicationContext";
Mitsuru Oshima569076c2009-07-02 20:06:08 -0700143 private final static boolean DEBUG = false;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800144
Brad Fitzpatrick333b8cb2010-08-26 12:04:57 -0700145 private static final HashMap<String, SharedPreferencesImpl> sSharedPrefs =
146 new HashMap<String, SharedPreferencesImpl>();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800147
Dianne Hackborn01e4cfc2010-06-24 15:07:24 -0700148 /*package*/ LoadedApk mPackageInfo;
Dianne Hackborn6c418d52011-06-29 14:05:33 -0700149 private String mBasePackageName;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800150 private Resources mResources;
151 /*package*/ ActivityThread mMainThread;
152 private Context mOuterContext;
153 private IBinder mActivityToken = null;
154 private ApplicationContentResolver mContentResolver;
155 private int mThemeResource = 0;
156 private Resources.Theme mTheme = null;
157 private PackageManager mPackageManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800158 private Context mReceiverRestrictedContext = null;
Romain Guy870e09f2009-07-06 16:35:25 -0700159 private boolean mRestricted;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800160
161 private final Object mSync = new Object();
162
163 private File mDatabasesDir;
164 private File mPreferencesDir;
165 private File mFilesDir;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800166 private File mCacheDir;
Dianne Hackborn805fd7e2011-01-16 18:30:29 -0800167 private File mObbDir;
Dianne Hackborne83cefce2010-02-04 17:38:14 -0800168 private File mExternalFilesDir;
169 private File mExternalCacheDir;
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +0200170
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800171 private static final String[] EMPTY_FILE_LIST = {};
172
Brad Fitzpatrick224ba0c2010-11-12 12:22:15 -0800173 /**
174 * Override this class when the system service constructor needs a
175 * ContextImpl. Else, use StaticServiceFetcher below.
176 */
177 /*package*/ static class ServiceFetcher {
178 int mContextCacheIndex = -1;
179
180 /**
181 * Main entrypoint; only override if you don't need caching.
182 */
183 public Object getService(ContextImpl ctx) {
184 ArrayList<Object> cache = ctx.mServiceCache;
185 Object service;
186 synchronized (cache) {
187 if (cache.size() == 0) {
188 // Initialize the cache vector on first access.
189 // At this point sNextPerContextServiceCacheIndex
190 // is the number of potential services that are
191 // cached per-Context.
192 for (int i = 0; i < sNextPerContextServiceCacheIndex; i++) {
193 cache.add(null);
194 }
195 } else {
196 service = cache.get(mContextCacheIndex);
197 if (service != null) {
198 return service;
199 }
200 }
201 service = createService(ctx);
202 cache.set(mContextCacheIndex, service);
203 return service;
204 }
205 }
206
207 /**
208 * Override this to create a new per-Context instance of the
209 * service. getService() will handle locking and caching.
210 */
211 public Object createService(ContextImpl ctx) {
212 throw new RuntimeException("Not implemented");
213 }
214 }
215
216 /**
217 * Override this class for services to be cached process-wide.
218 */
219 abstract static class StaticServiceFetcher extends ServiceFetcher {
220 private Object mCachedInstance;
221
222 @Override
223 public final Object getService(ContextImpl unused) {
224 synchronized (StaticServiceFetcher.this) {
225 Object service = mCachedInstance;
226 if (service != null) {
227 return service;
228 }
229 return mCachedInstance = createStaticService();
230 }
231 }
232
233 public abstract Object createStaticService();
234 }
235
236 private static final HashMap<String, ServiceFetcher> SYSTEM_SERVICE_MAP =
237 new HashMap<String, ServiceFetcher>();
238
239 private static int sNextPerContextServiceCacheIndex = 0;
240 private static void registerService(String serviceName, ServiceFetcher fetcher) {
241 if (!(fetcher instanceof StaticServiceFetcher)) {
242 fetcher.mContextCacheIndex = sNextPerContextServiceCacheIndex++;
243 }
244 SYSTEM_SERVICE_MAP.put(serviceName, fetcher);
245 }
246
247 // This one's defined separately and given a variable name so it
248 // can be re-used by getWallpaperManager(), avoiding a HashMap
249 // lookup.
250 private static ServiceFetcher WALLPAPER_FETCHER = new ServiceFetcher() {
251 public Object createService(ContextImpl ctx) {
252 return new WallpaperManager(ctx.getOuterContext(),
253 ctx.mMainThread.getHandler());
254 }};
255
256 static {
257 registerService(ACCESSIBILITY_SERVICE, new ServiceFetcher() {
258 public Object getService(ContextImpl ctx) {
259 return AccessibilityManager.getInstance(ctx);
260 }});
261
262 registerService(ACCOUNT_SERVICE, new ServiceFetcher() {
263 public Object createService(ContextImpl ctx) {
264 IBinder b = ServiceManager.getService(ACCOUNT_SERVICE);
265 IAccountManager service = IAccountManager.Stub.asInterface(b);
266 return new AccountManager(ctx, service);
267 }});
268
269 registerService(ACTIVITY_SERVICE, new ServiceFetcher() {
270 public Object createService(ContextImpl ctx) {
271 return new ActivityManager(ctx.getOuterContext(), ctx.mMainThread.getHandler());
272 }});
273
274 registerService(ALARM_SERVICE, new StaticServiceFetcher() {
275 public Object createStaticService() {
276 IBinder b = ServiceManager.getService(ALARM_SERVICE);
277 IAlarmManager service = IAlarmManager.Stub.asInterface(b);
278 return new AlarmManager(service);
279 }});
280
281 registerService(AUDIO_SERVICE, new ServiceFetcher() {
282 public Object createService(ContextImpl ctx) {
283 return new AudioManager(ctx);
284 }});
285
286 registerService(CLIPBOARD_SERVICE, new ServiceFetcher() {
287 public Object createService(ContextImpl ctx) {
288 return new ClipboardManager(ctx.getOuterContext(),
289 ctx.mMainThread.getHandler());
290 }});
291
292 registerService(CONNECTIVITY_SERVICE, new StaticServiceFetcher() {
293 public Object createStaticService() {
294 IBinder b = ServiceManager.getService(CONNECTIVITY_SERVICE);
295 return new ConnectivityManager(IConnectivityManager.Stub.asInterface(b));
296 }});
297
298 registerService(COUNTRY_DETECTOR, new StaticServiceFetcher() {
299 public Object createStaticService() {
300 IBinder b = ServiceManager.getService(COUNTRY_DETECTOR);
301 return new CountryDetector(ICountryDetector.Stub.asInterface(b));
302 }});
303
304 registerService(DEVICE_POLICY_SERVICE, new ServiceFetcher() {
305 public Object createService(ContextImpl ctx) {
306 return DevicePolicyManager.create(ctx, ctx.mMainThread.getHandler());
307 }});
308
309 registerService(DOWNLOAD_SERVICE, new ServiceFetcher() {
310 public Object createService(ContextImpl ctx) {
311 return new DownloadManager(ctx.getContentResolver(), ctx.getPackageName());
312 }});
313
Nick Pellyd2507462010-12-13 12:22:34 -0800314 registerService(NFC_SERVICE, new ServiceFetcher() {
315 public Object createService(ContextImpl ctx) {
316 return new NfcManager(ctx);
317 }});
318
Brad Fitzpatrick224ba0c2010-11-12 12:22:15 -0800319 registerService(DROPBOX_SERVICE, new StaticServiceFetcher() {
320 public Object createStaticService() {
321 return createDropBoxManager();
322 }});
323
324 registerService(INPUT_METHOD_SERVICE, new ServiceFetcher() {
325 public Object createService(ContextImpl ctx) {
326 return InputMethodManager.getInstance(ctx);
327 }});
328
satok988323c2011-06-22 16:38:13 +0900329 registerService(TEXT_SERVICES_MANAGER_SERVICE, new ServiceFetcher() {
330 public Object createService(ContextImpl ctx) {
331 return TextServicesManager.getInstance();
332 }});
333
Brad Fitzpatrick224ba0c2010-11-12 12:22:15 -0800334 registerService(KEYGUARD_SERVICE, new ServiceFetcher() {
335 public Object getService(ContextImpl ctx) {
336 // TODO: why isn't this caching it? It wasn't
337 // before, so I'm preserving the old behavior and
338 // using getService(), instead of createService()
339 // which would do the caching.
340 return new KeyguardManager();
341 }});
342
343 registerService(LAYOUT_INFLATER_SERVICE, new ServiceFetcher() {
344 public Object createService(ContextImpl ctx) {
345 return PolicyManager.makeNewLayoutInflater(ctx.getOuterContext());
346 }});
347
348 registerService(LOCATION_SERVICE, new StaticServiceFetcher() {
349 public Object createStaticService() {
350 IBinder b = ServiceManager.getService(LOCATION_SERVICE);
351 return new LocationManager(ILocationManager.Stub.asInterface(b));
352 }});
353
Jeff Sharkey1a303952011-06-16 13:04:20 -0700354 registerService(NETWORK_POLICY_SERVICE, new ServiceFetcher() {
355 @Override
356 public Object createService(ContextImpl ctx) {
357 return new NetworkPolicyManager(INetworkPolicyManager.Stub.asInterface(
358 ServiceManager.getService(NETWORK_POLICY_SERVICE)));
359 }
360 });
361
Brad Fitzpatrick224ba0c2010-11-12 12:22:15 -0800362 registerService(NOTIFICATION_SERVICE, new ServiceFetcher() {
363 public Object createService(ContextImpl ctx) {
364 final Context outerContext = ctx.getOuterContext();
365 return new NotificationManager(
366 new ContextThemeWrapper(outerContext,
Dianne Hackbornd922ae02011-01-14 11:43:24 -0800367 Resources.selectSystemTheme(0,
368 outerContext.getApplicationInfo().targetSdkVersion,
369 com.android.internal.R.style.Theme_Dialog,
Adam Powell6e90a362011-08-14 16:48:32 -0700370 com.android.internal.R.style.Theme_Holo_Dialog,
371 com.android.internal.R.style.Theme_DeviceDefault_Dialog)),
Brad Fitzpatrick224ba0c2010-11-12 12:22:15 -0800372 ctx.mMainThread.getHandler());
373 }});
374
375 // Note: this was previously cached in a static variable, but
376 // constructed using mMainThread.getHandler(), so converting
377 // it to be a regular Context-cached service...
378 registerService(POWER_SERVICE, new ServiceFetcher() {
379 public Object createService(ContextImpl ctx) {
380 IBinder b = ServiceManager.getService(POWER_SERVICE);
381 IPowerManager service = IPowerManager.Stub.asInterface(b);
382 return new PowerManager(service, ctx.mMainThread.getHandler());
383 }});
384
385 registerService(SEARCH_SERVICE, new ServiceFetcher() {
386 public Object createService(ContextImpl ctx) {
387 return new SearchManager(ctx.getOuterContext(),
388 ctx.mMainThread.getHandler());
389 }});
390
391 registerService(SENSOR_SERVICE, new ServiceFetcher() {
392 public Object createService(ContextImpl ctx) {
393 return new SensorManager(ctx.mMainThread.getHandler().getLooper());
394 }});
395
396 registerService(STATUS_BAR_SERVICE, new ServiceFetcher() {
397 public Object createService(ContextImpl ctx) {
398 return new StatusBarManager(ctx.getOuterContext());
399 }});
400
401 registerService(STORAGE_SERVICE, new ServiceFetcher() {
402 public Object createService(ContextImpl ctx) {
403 try {
404 return new StorageManager(ctx.mMainThread.getHandler().getLooper());
405 } catch (RemoteException rex) {
406 Log.e(TAG, "Failed to create StorageManager", rex);
407 return null;
408 }
409 }});
410
411 registerService(TELEPHONY_SERVICE, new ServiceFetcher() {
412 public Object createService(ContextImpl ctx) {
413 return new TelephonyManager(ctx.getOuterContext());
414 }});
415
416 registerService(THROTTLE_SERVICE, new StaticServiceFetcher() {
417 public Object createStaticService() {
418 IBinder b = ServiceManager.getService(THROTTLE_SERVICE);
419 return new ThrottleManager(IThrottleManager.Stub.asInterface(b));
420 }});
421
422 registerService(UI_MODE_SERVICE, new ServiceFetcher() {
423 public Object createService(ContextImpl ctx) {
424 return new UiModeManager();
425 }});
426
Mike Lockwood3a68b832011-03-08 10:08:59 -0500427 registerService(USB_SERVICE, new ServiceFetcher() {
428 public Object createService(ContextImpl ctx) {
Mike Lockwoode7d511e2010-12-30 13:39:37 -0500429 IBinder b = ServiceManager.getService(USB_SERVICE);
Mike Lockwood3a68b832011-03-08 10:08:59 -0500430 return new UsbManager(ctx, IUsbManager.Stub.asInterface(b));
Mike Lockwoode7d511e2010-12-30 13:39:37 -0500431 }});
432
Mike Lockwoodb01e8bf2011-08-29 20:11:07 -0400433 registerService(SERIAL_SERVICE, new ServiceFetcher() {
434 public Object createService(ContextImpl ctx) {
435 IBinder b = ServiceManager.getService(SERIAL_SERVICE);
436 return new SerialManager(ctx, ISerialManager.Stub.asInterface(b));
437 }});
438
Brad Fitzpatrick224ba0c2010-11-12 12:22:15 -0800439 registerService(VIBRATOR_SERVICE, new ServiceFetcher() {
440 public Object createService(ContextImpl ctx) {
441 return new Vibrator();
442 }});
443
444 registerService(WALLPAPER_SERVICE, WALLPAPER_FETCHER);
445
446 registerService(WIFI_SERVICE, new ServiceFetcher() {
447 public Object createService(ContextImpl ctx) {
448 IBinder b = ServiceManager.getService(WIFI_SERVICE);
449 IWifiManager service = IWifiManager.Stub.asInterface(b);
450 return new WifiManager(service, ctx.mMainThread.getHandler());
451 }});
452
repo sync55bc5f32011-06-24 14:23:07 -0700453 registerService(WIFI_P2P_SERVICE, new ServiceFetcher() {
454 public Object createService(ContextImpl ctx) {
455 IBinder b = ServiceManager.getService(WIFI_P2P_SERVICE);
456 IWifiP2pManager service = IWifiP2pManager.Stub.asInterface(b);
457 return new WifiP2pManager(service);
458 }});
459
Brad Fitzpatrick224ba0c2010-11-12 12:22:15 -0800460 registerService(WINDOW_SERVICE, new ServiceFetcher() {
461 public Object getService(ContextImpl ctx) {
Dianne Hackborn5fd21692011-06-07 14:09:47 -0700462 return WindowManagerImpl.getDefault(ctx.mPackageInfo.mCompatibilityInfo);
Brad Fitzpatrick224ba0c2010-11-12 12:22:15 -0800463 }});
464 }
465
Dianne Hackborn5fd21692011-06-07 14:09:47 -0700466 static ContextImpl getImpl(Context context) {
467 Context nextContext;
468 while ((context instanceof ContextWrapper) &&
469 (nextContext=((ContextWrapper)context).getBaseContext()) != null) {
470 context = nextContext;
471 }
472 return (ContextImpl)context;
473 }
474
Brad Fitzpatrick224ba0c2010-11-12 12:22:15 -0800475 // The system service cache for the system services that are
476 // cached per-ContextImpl. Package-scoped to avoid accessor
477 // methods.
478 final ArrayList<Object> mServiceCache = new ArrayList<Object>();
479
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800480 @Override
481 public AssetManager getAssets() {
482 return mResources.getAssets();
483 }
484
485 @Override
486 public Resources getResources() {
487 return mResources;
488 }
489
490 @Override
491 public PackageManager getPackageManager() {
492 if (mPackageManager != null) {
493 return mPackageManager;
494 }
495
496 IPackageManager pm = ActivityThread.getPackageManager();
497 if (pm != null) {
498 // Doesn't matter if we make more than one instance.
499 return (mPackageManager = new ApplicationPackageManager(this, pm));
500 }
501
502 return null;
503 }
504
505 @Override
506 public ContentResolver getContentResolver() {
507 return mContentResolver;
508 }
509
510 @Override
511 public Looper getMainLooper() {
512 return mMainThread.getLooper();
513 }
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +0200514
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800515 @Override
516 public Context getApplicationContext() {
Christopher Tateeb9e9ec2010-03-23 17:14:36 -0700517 return (mPackageInfo != null) ?
518 mPackageInfo.getApplication() : mMainThread.getApplication();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800519 }
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +0200520
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800521 @Override
522 public void setTheme(int resid) {
523 mThemeResource = resid;
524 }
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +0200525
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800526 @Override
Dianne Hackborn247fe742011-01-08 17:25:57 -0800527 public int getThemeResId() {
528 return mThemeResource;
529 }
530
531 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800532 public Resources.Theme getTheme() {
533 if (mTheme == null) {
Dianne Hackbornd922ae02011-01-14 11:43:24 -0800534 mThemeResource = Resources.selectDefaultTheme(mThemeResource,
535 getOuterContext().getApplicationInfo().targetSdkVersion);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800536 mTheme = mResources.newTheme();
537 mTheme.applyStyle(mThemeResource, true);
538 }
539 return mTheme;
540 }
541
542 @Override
543 public ClassLoader getClassLoader() {
544 return mPackageInfo != null ?
545 mPackageInfo.getClassLoader() : ClassLoader.getSystemClassLoader();
546 }
547
548 @Override
549 public String getPackageName() {
550 if (mPackageInfo != null) {
551 return mPackageInfo.getPackageName();
552 }
553 throw new RuntimeException("Not supported in system context");
554 }
555
556 @Override
Dianne Hackborn5c1e00b2009-06-18 17:10:57 -0700557 public ApplicationInfo getApplicationInfo() {
558 if (mPackageInfo != null) {
559 return mPackageInfo.getApplicationInfo();
560 }
561 throw new RuntimeException("Not supported in system context");
562 }
563
564 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800565 public String getPackageResourcePath() {
566 if (mPackageInfo != null) {
567 return mPackageInfo.getResDir();
568 }
569 throw new RuntimeException("Not supported in system context");
570 }
571
572 @Override
573 public String getPackageCodePath() {
574 if (mPackageInfo != null) {
575 return mPackageInfo.getAppDir();
576 }
577 throw new RuntimeException("Not supported in system context");
578 }
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +0200579
Joe Onorato23ecae32009-06-10 17:07:15 -0700580 public File getSharedPrefsFile(String name) {
581 return makeFilename(getPreferencesDir(), name + ".xml");
582 }
583
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800584 @Override
585 public SharedPreferences getSharedPreferences(String name, int mode) {
586 SharedPreferencesImpl sp;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800587 synchronized (sSharedPrefs) {
Brad Fitzpatrick333b8cb2010-08-26 12:04:57 -0700588 sp = sSharedPrefs.get(name);
Brad Fitzpatrick6194c532010-09-07 18:00:33 -0700589 if (sp == null) {
Brad Fitzpatrick4cd50b82010-12-01 17:31:45 -0800590 File prefsFile = getSharedPrefsFile(name);
591 sp = new SharedPreferencesImpl(prefsFile, mode);
Brad Fitzpatrick6194c532010-09-07 18:00:33 -0700592 sSharedPrefs.put(name, sp);
Brad Fitzpatrick6194c532010-09-07 18:00:33 -0700593 return sp;
594 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800595 }
Brad Fitzpatrick4e920f72010-12-14 11:52:13 -0800596 if ((mode & Context.MODE_MULTI_PROCESS) != 0 ||
597 getApplicationInfo().targetSdkVersion < android.os.Build.VERSION_CODES.HONEYCOMB) {
598 // If somebody else (some other process) changed the prefs
599 // file behind our back, we reload it. This has been the
600 // historical (if undocumented) behavior.
601 sp.startReloadIfChangedUnexpectedly();
602 }
Brad Fitzpatrick6194c532010-09-07 18:00:33 -0700603 return sp;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800604 }
605
606 private File getPreferencesDir() {
607 synchronized (mSync) {
608 if (mPreferencesDir == null) {
609 mPreferencesDir = new File(getDataDirFile(), "shared_prefs");
610 }
611 return mPreferencesDir;
612 }
613 }
614
615 @Override
616 public FileInputStream openFileInput(String name)
617 throws FileNotFoundException {
618 File f = makeFilename(getFilesDir(), name);
619 return new FileInputStream(f);
620 }
621
622 @Override
623 public FileOutputStream openFileOutput(String name, int mode)
624 throws FileNotFoundException {
625 final boolean append = (mode&MODE_APPEND) != 0;
626 File f = makeFilename(getFilesDir(), name);
627 try {
628 FileOutputStream fos = new FileOutputStream(f, append);
629 setFilePermissionsFromMode(f.getPath(), mode, 0);
630 return fos;
631 } catch (FileNotFoundException e) {
632 }
633
634 File parent = f.getParentFile();
635 parent.mkdir();
636 FileUtils.setPermissions(
637 parent.getPath(),
638 FileUtils.S_IRWXU|FileUtils.S_IRWXG|FileUtils.S_IXOTH,
639 -1, -1);
640 FileOutputStream fos = new FileOutputStream(f, append);
641 setFilePermissionsFromMode(f.getPath(), mode, 0);
642 return fos;
643 }
644
645 @Override
646 public boolean deleteFile(String name) {
647 File f = makeFilename(getFilesDir(), name);
648 return f.delete();
649 }
650
651 @Override
652 public File getFilesDir() {
653 synchronized (mSync) {
654 if (mFilesDir == null) {
655 mFilesDir = new File(getDataDirFile(), "files");
656 }
657 if (!mFilesDir.exists()) {
658 if(!mFilesDir.mkdirs()) {
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +0200659 Log.w(TAG, "Unable to create files directory " + mFilesDir.getPath());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800660 return null;
661 }
662 FileUtils.setPermissions(
663 mFilesDir.getPath(),
664 FileUtils.S_IRWXU|FileUtils.S_IRWXG|FileUtils.S_IXOTH,
665 -1, -1);
666 }
667 return mFilesDir;
668 }
669 }
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +0200670
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800671 @Override
Dianne Hackborne83cefce2010-02-04 17:38:14 -0800672 public File getExternalFilesDir(String type) {
673 synchronized (mSync) {
674 if (mExternalFilesDir == null) {
675 mExternalFilesDir = Environment.getExternalStorageAppFilesDirectory(
676 getPackageName());
677 }
678 if (!mExternalFilesDir.exists()) {
679 try {
680 (new File(Environment.getExternalStorageAndroidDataDir(),
681 ".nomedia")).createNewFile();
682 } catch (IOException e) {
683 }
684 if (!mExternalFilesDir.mkdirs()) {
685 Log.w(TAG, "Unable to create external files directory");
686 return null;
687 }
688 }
689 if (type == null) {
690 return mExternalFilesDir;
691 }
692 File dir = new File(mExternalFilesDir, type);
693 if (!dir.exists()) {
694 if (!dir.mkdirs()) {
695 Log.w(TAG, "Unable to create external media directory " + dir);
696 return null;
697 }
698 }
699 return dir;
700 }
701 }
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +0200702
Dianne Hackborne83cefce2010-02-04 17:38:14 -0800703 @Override
Dianne Hackborn805fd7e2011-01-16 18:30:29 -0800704 public File getObbDir() {
705 synchronized (mSync) {
706 if (mObbDir == null) {
707 mObbDir = Environment.getExternalStorageAppObbDirectory(
708 getPackageName());
709 }
710 return mObbDir;
711 }
712 }
713
714 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800715 public File getCacheDir() {
716 synchronized (mSync) {
717 if (mCacheDir == null) {
718 mCacheDir = new File(getDataDirFile(), "cache");
719 }
720 if (!mCacheDir.exists()) {
721 if(!mCacheDir.mkdirs()) {
722 Log.w(TAG, "Unable to create cache directory");
723 return null;
724 }
725 FileUtils.setPermissions(
726 mCacheDir.getPath(),
727 FileUtils.S_IRWXU|FileUtils.S_IRWXG|FileUtils.S_IXOTH,
728 -1, -1);
729 }
730 }
731 return mCacheDir;
732 }
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +0200733
Dianne Hackborne83cefce2010-02-04 17:38:14 -0800734 @Override
735 public File getExternalCacheDir() {
736 synchronized (mSync) {
737 if (mExternalCacheDir == null) {
738 mExternalCacheDir = Environment.getExternalStorageAppCacheDirectory(
739 getPackageName());
740 }
741 if (!mExternalCacheDir.exists()) {
742 try {
743 (new File(Environment.getExternalStorageAndroidDataDir(),
744 ".nomedia")).createNewFile();
745 } catch (IOException e) {
746 }
747 if (!mExternalCacheDir.mkdirs()) {
748 Log.w(TAG, "Unable to create external cache directory");
749 return null;
750 }
751 }
752 return mExternalCacheDir;
753 }
754 }
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +0200755
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800756 @Override
757 public File getFileStreamPath(String name) {
758 return makeFilename(getFilesDir(), name);
759 }
760
761 @Override
762 public String[] fileList() {
763 final String[] list = getFilesDir().list();
764 return (list != null) ? list : EMPTY_FILE_LIST;
765 }
766
767 @Override
768 public SQLiteDatabase openOrCreateDatabase(String name, int mode, CursorFactory factory) {
Oscar Montemayora8529f62009-11-18 10:14:20 -0800769 File f = validateFilePath(name, true);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800770 SQLiteDatabase db = SQLiteDatabase.openOrCreateDatabase(f, factory);
771 setFilePermissionsFromMode(f.getPath(), mode, 0);
772 return db;
773 }
774
775 @Override
Vasu Nori74f170f2010-06-01 18:06:18 -0700776 public SQLiteDatabase openOrCreateDatabase(String name, int mode, CursorFactory factory,
777 DatabaseErrorHandler errorHandler) {
778 File f = validateFilePath(name, true);
779 SQLiteDatabase db = SQLiteDatabase.openOrCreateDatabase(f.getPath(), factory, errorHandler);
780 setFilePermissionsFromMode(f.getPath(), mode, 0);
781 return db;
782 }
783
784 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800785 public boolean deleteDatabase(String name) {
786 try {
Oscar Montemayora8529f62009-11-18 10:14:20 -0800787 File f = validateFilePath(name, false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800788 return f.delete();
789 } catch (Exception e) {
790 }
791 return false;
792 }
793
794 @Override
795 public File getDatabasePath(String name) {
Oscar Montemayora8529f62009-11-18 10:14:20 -0800796 return validateFilePath(name, false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800797 }
798
799 @Override
800 public String[] databaseList() {
801 final String[] list = getDatabasesDir().list();
802 return (list != null) ? list : EMPTY_FILE_LIST;
803 }
804
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +0200805
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800806 private File getDatabasesDir() {
807 synchronized (mSync) {
808 if (mDatabasesDir == null) {
809 mDatabasesDir = new File(getDataDirFile(), "databases");
810 }
811 if (mDatabasesDir.getPath().equals("databases")) {
812 mDatabasesDir = new File("/data/system");
813 }
814 return mDatabasesDir;
815 }
816 }
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +0200817
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800818 @Override
819 public Drawable getWallpaper() {
Dianne Hackborn4c62fc02009-08-08 20:40:27 -0700820 return getWallpaperManager().getDrawable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800821 }
822
823 @Override
Dianne Hackborn8cc6a502009-08-05 21:29:42 -0700824 public Drawable peekWallpaper() {
Dianne Hackborn4c62fc02009-08-08 20:40:27 -0700825 return getWallpaperManager().peekDrawable();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800826 }
827
828 @Override
829 public int getWallpaperDesiredMinimumWidth() {
Dianne Hackborn8cc6a502009-08-05 21:29:42 -0700830 return getWallpaperManager().getDesiredMinimumWidth();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800831 }
832
833 @Override
834 public int getWallpaperDesiredMinimumHeight() {
Dianne Hackborn8cc6a502009-08-05 21:29:42 -0700835 return getWallpaperManager().getDesiredMinimumHeight();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800836 }
837
838 @Override
839 public void setWallpaper(Bitmap bitmap) throws IOException {
Dianne Hackborn4c62fc02009-08-08 20:40:27 -0700840 getWallpaperManager().setBitmap(bitmap);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800841 }
842
843 @Override
844 public void setWallpaper(InputStream data) throws IOException {
Dianne Hackborn4c62fc02009-08-08 20:40:27 -0700845 getWallpaperManager().setStream(data);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800846 }
847
848 @Override
849 public void clearWallpaper() throws IOException {
Dianne Hackborn8cc6a502009-08-05 21:29:42 -0700850 getWallpaperManager().clear();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800851 }
852
853 @Override
854 public void startActivity(Intent intent) {
855 if ((intent.getFlags()&Intent.FLAG_ACTIVITY_NEW_TASK) == 0) {
856 throw new AndroidRuntimeException(
857 "Calling startActivity() from outside of an Activity "
858 + " context requires the FLAG_ACTIVITY_NEW_TASK flag."
859 + " Is this really what you want?");
860 }
861 mMainThread.getInstrumentation().execStartActivity(
Dianne Hackborn6e8304e2010-05-14 00:42:53 -0700862 getOuterContext(), mMainThread.getApplicationThread(), null,
863 (Activity)null, intent, -1);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800864 }
865
866 @Override
Dianne Hackborn621e17d2010-11-22 15:59:56 -0800867 public void startActivities(Intent[] intents) {
868 if ((intents[0].getFlags()&Intent.FLAG_ACTIVITY_NEW_TASK) == 0) {
869 throw new AndroidRuntimeException(
870 "Calling startActivities() from outside of an Activity "
871 + " context requires the FLAG_ACTIVITY_NEW_TASK flag on first Intent."
872 + " Is this really what you want?");
873 }
874 mMainThread.getInstrumentation().execStartActivities(
875 getOuterContext(), mMainThread.getApplicationThread(), null,
876 (Activity)null, intents);
877 }
878
879 @Override
Dianne Hackbornfa82f222009-09-17 15:14:12 -0700880 public void startIntentSender(IntentSender intent,
881 Intent fillInIntent, int flagsMask, int flagsValues, int extraFlags)
882 throws IntentSender.SendIntentException {
883 try {
884 String resolvedType = null;
885 if (fillInIntent != null) {
Dianne Hackborn9ecebbf2011-09-28 23:19:47 -0400886 fillInIntent.setAllowFds(false);
Dianne Hackbornfa82f222009-09-17 15:14:12 -0700887 resolvedType = fillInIntent.resolveTypeIfNeeded(getContentResolver());
888 }
889 int result = ActivityManagerNative.getDefault()
890 .startActivityIntentSender(mMainThread.getApplicationThread(), intent,
891 fillInIntent, resolvedType, null, null,
892 0, flagsMask, flagsValues);
893 if (result == IActivityManager.START_CANCELED) {
894 throw new IntentSender.SendIntentException();
895 }
896 Instrumentation.checkStartActivityResult(result, null);
897 } catch (RemoteException e) {
898 }
899 }
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +0200900
Dianne Hackbornfa82f222009-09-17 15:14:12 -0700901 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800902 public void sendBroadcast(Intent intent) {
903 String resolvedType = intent.resolveTypeIfNeeded(getContentResolver());
904 try {
Dianne Hackborn9ecebbf2011-09-28 23:19:47 -0400905 intent.setAllowFds(false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800906 ActivityManagerNative.getDefault().broadcastIntent(
907 mMainThread.getApplicationThread(), intent, resolvedType, null,
Amith Yamasani742a6712011-05-04 14:49:28 -0700908 Activity.RESULT_OK, null, null, null, false, false,
909 Binder.getOrigCallingUser());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800910 } catch (RemoteException e) {
911 }
912 }
913
914 @Override
915 public void sendBroadcast(Intent intent, String receiverPermission) {
916 String resolvedType = intent.resolveTypeIfNeeded(getContentResolver());
917 try {
Dianne Hackborn9ecebbf2011-09-28 23:19:47 -0400918 intent.setAllowFds(false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800919 ActivityManagerNative.getDefault().broadcastIntent(
920 mMainThread.getApplicationThread(), intent, resolvedType, null,
Amith Yamasani742a6712011-05-04 14:49:28 -0700921 Activity.RESULT_OK, null, null, receiverPermission, false, false,
922 Binder.getOrigCallingUser());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800923 } catch (RemoteException e) {
924 }
925 }
926
927 @Override
928 public void sendOrderedBroadcast(Intent intent,
929 String receiverPermission) {
930 String resolvedType = intent.resolveTypeIfNeeded(getContentResolver());
931 try {
Dianne Hackborn9ecebbf2011-09-28 23:19:47 -0400932 intent.setAllowFds(false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800933 ActivityManagerNative.getDefault().broadcastIntent(
934 mMainThread.getApplicationThread(), intent, resolvedType, null,
Amith Yamasani742a6712011-05-04 14:49:28 -0700935 Activity.RESULT_OK, null, null, receiverPermission, true, false,
936 Binder.getOrigCallingUser());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800937 } catch (RemoteException e) {
938 }
939 }
940
941 @Override
942 public void sendOrderedBroadcast(Intent intent,
943 String receiverPermission, BroadcastReceiver resultReceiver,
944 Handler scheduler, int initialCode, String initialData,
945 Bundle initialExtras) {
946 IIntentReceiver rd = null;
947 if (resultReceiver != null) {
948 if (mPackageInfo != null) {
949 if (scheduler == null) {
950 scheduler = mMainThread.getHandler();
951 }
952 rd = mPackageInfo.getReceiverDispatcher(
953 resultReceiver, getOuterContext(), scheduler,
954 mMainThread.getInstrumentation(), false);
955 } else {
956 if (scheduler == null) {
957 scheduler = mMainThread.getHandler();
958 }
Dianne Hackborn01e4cfc2010-06-24 15:07:24 -0700959 rd = new LoadedApk.ReceiverDispatcher(
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800960 resultReceiver, getOuterContext(), scheduler, null, false).getIIntentReceiver();
961 }
962 }
963 String resolvedType = intent.resolveTypeIfNeeded(getContentResolver());
964 try {
Dianne Hackborn9ecebbf2011-09-28 23:19:47 -0400965 intent.setAllowFds(false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800966 ActivityManagerNative.getDefault().broadcastIntent(
967 mMainThread.getApplicationThread(), intent, resolvedType, rd,
968 initialCode, initialData, initialExtras, receiverPermission,
Amith Yamasani742a6712011-05-04 14:49:28 -0700969 true, false, Binder.getOrigCallingUser());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800970 } catch (RemoteException e) {
971 }
972 }
973
974 @Override
975 public void sendStickyBroadcast(Intent intent) {
976 String resolvedType = intent.resolveTypeIfNeeded(getContentResolver());
977 try {
Dianne Hackborn9ecebbf2011-09-28 23:19:47 -0400978 intent.setAllowFds(false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800979 ActivityManagerNative.getDefault().broadcastIntent(
980 mMainThread.getApplicationThread(), intent, resolvedType, null,
Amith Yamasani742a6712011-05-04 14:49:28 -0700981 Activity.RESULT_OK, null, null, null, false, true,
982 Binder.getOrigCallingUser());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800983 } catch (RemoteException e) {
984 }
985 }
986
987 @Override
Dianne Hackbornefa199f2009-09-19 12:03:15 -0700988 public void sendStickyOrderedBroadcast(Intent intent,
989 BroadcastReceiver resultReceiver,
990 Handler scheduler, int initialCode, String initialData,
991 Bundle initialExtras) {
992 IIntentReceiver rd = null;
993 if (resultReceiver != null) {
994 if (mPackageInfo != null) {
995 if (scheduler == null) {
996 scheduler = mMainThread.getHandler();
997 }
998 rd = mPackageInfo.getReceiverDispatcher(
999 resultReceiver, getOuterContext(), scheduler,
1000 mMainThread.getInstrumentation(), false);
1001 } else {
1002 if (scheduler == null) {
1003 scheduler = mMainThread.getHandler();
1004 }
Dianne Hackborn01e4cfc2010-06-24 15:07:24 -07001005 rd = new LoadedApk.ReceiverDispatcher(
Dianne Hackbornefa199f2009-09-19 12:03:15 -07001006 resultReceiver, getOuterContext(), scheduler, null, false).getIIntentReceiver();
1007 }
1008 }
1009 String resolvedType = intent.resolveTypeIfNeeded(getContentResolver());
1010 try {
Dianne Hackborn9ecebbf2011-09-28 23:19:47 -04001011 intent.setAllowFds(false);
Dianne Hackbornefa199f2009-09-19 12:03:15 -07001012 ActivityManagerNative.getDefault().broadcastIntent(
1013 mMainThread.getApplicationThread(), intent, resolvedType, rd,
1014 initialCode, initialData, initialExtras, null,
Amith Yamasani742a6712011-05-04 14:49:28 -07001015 true, true, Binder.getOrigCallingUser());
Dianne Hackbornefa199f2009-09-19 12:03:15 -07001016 } catch (RemoteException e) {
1017 }
1018 }
1019
1020 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001021 public void removeStickyBroadcast(Intent intent) {
1022 String resolvedType = intent.resolveTypeIfNeeded(getContentResolver());
1023 if (resolvedType != null) {
1024 intent = new Intent(intent);
1025 intent.setDataAndType(intent.getData(), resolvedType);
1026 }
1027 try {
Dianne Hackborn9ecebbf2011-09-28 23:19:47 -04001028 intent.setAllowFds(false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001029 ActivityManagerNative.getDefault().unbroadcastIntent(
Amith Yamasani742a6712011-05-04 14:49:28 -07001030 mMainThread.getApplicationThread(), intent, Binder.getOrigCallingUser());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001031 } catch (RemoteException e) {
1032 }
1033 }
1034
1035 @Override
1036 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter) {
1037 return registerReceiver(receiver, filter, null, null);
1038 }
1039
1040 @Override
1041 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter,
1042 String broadcastPermission, Handler scheduler) {
1043 return registerReceiverInternal(receiver, filter, broadcastPermission,
1044 scheduler, getOuterContext());
1045 }
1046
1047 private Intent registerReceiverInternal(BroadcastReceiver receiver,
1048 IntentFilter filter, String broadcastPermission,
1049 Handler scheduler, Context context) {
1050 IIntentReceiver rd = null;
1051 if (receiver != null) {
1052 if (mPackageInfo != null && context != null) {
1053 if (scheduler == null) {
1054 scheduler = mMainThread.getHandler();
1055 }
1056 rd = mPackageInfo.getReceiverDispatcher(
1057 receiver, context, scheduler,
1058 mMainThread.getInstrumentation(), true);
1059 } else {
1060 if (scheduler == null) {
1061 scheduler = mMainThread.getHandler();
1062 }
Dianne Hackborn01e4cfc2010-06-24 15:07:24 -07001063 rd = new LoadedApk.ReceiverDispatcher(
Dianne Hackborn399cccb2010-04-13 22:57:49 -07001064 receiver, context, scheduler, null, true).getIIntentReceiver();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001065 }
1066 }
1067 try {
1068 return ActivityManagerNative.getDefault().registerReceiver(
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001069 mMainThread.getApplicationThread(), mBasePackageName,
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001070 rd, filter, broadcastPermission);
1071 } catch (RemoteException e) {
1072 return null;
1073 }
1074 }
1075
1076 @Override
1077 public void unregisterReceiver(BroadcastReceiver receiver) {
1078 if (mPackageInfo != null) {
1079 IIntentReceiver rd = mPackageInfo.forgetReceiverDispatcher(
1080 getOuterContext(), receiver);
1081 try {
1082 ActivityManagerNative.getDefault().unregisterReceiver(rd);
1083 } catch (RemoteException e) {
1084 }
1085 } else {
1086 throw new RuntimeException("Not supported in system context");
1087 }
1088 }
1089
1090 @Override
1091 public ComponentName startService(Intent service) {
1092 try {
Dianne Hackborn9ecebbf2011-09-28 23:19:47 -04001093 service.setAllowFds(false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001094 ComponentName cn = ActivityManagerNative.getDefault().startService(
1095 mMainThread.getApplicationThread(), service,
1096 service.resolveTypeIfNeeded(getContentResolver()));
1097 if (cn != null && cn.getPackageName().equals("!")) {
1098 throw new SecurityException(
1099 "Not allowed to start service " + service
1100 + " without permission " + cn.getClassName());
1101 }
1102 return cn;
1103 } catch (RemoteException e) {
1104 return null;
1105 }
1106 }
1107
1108 @Override
1109 public boolean stopService(Intent service) {
1110 try {
Dianne Hackborn9ecebbf2011-09-28 23:19:47 -04001111 service.setAllowFds(false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001112 int res = ActivityManagerNative.getDefault().stopService(
1113 mMainThread.getApplicationThread(), service,
1114 service.resolveTypeIfNeeded(getContentResolver()));
1115 if (res < 0) {
1116 throw new SecurityException(
1117 "Not allowed to stop service " + service);
1118 }
1119 return res != 0;
1120 } catch (RemoteException e) {
1121 return false;
1122 }
1123 }
1124
1125 @Override
1126 public boolean bindService(Intent service, ServiceConnection conn,
1127 int flags) {
1128 IServiceConnection sd;
1129 if (mPackageInfo != null) {
1130 sd = mPackageInfo.getServiceDispatcher(conn, getOuterContext(),
1131 mMainThread.getHandler(), flags);
1132 } else {
1133 throw new RuntimeException("Not supported in system context");
1134 }
1135 try {
Dianne Hackbornc68c9132011-07-29 01:25:18 -07001136 IBinder token = getActivityToken();
1137 if (token == null && (flags&BIND_AUTO_CREATE) == 0 && mPackageInfo != null
1138 && mPackageInfo.getApplicationInfo().targetSdkVersion
1139 < android.os.Build.VERSION_CODES.ICE_CREAM_SANDWICH) {
1140 flags |= BIND_WAIVE_PRIORITY;
1141 }
Dianne Hackborn9ecebbf2011-09-28 23:19:47 -04001142 service.setAllowFds(false);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001143 int res = ActivityManagerNative.getDefault().bindService(
1144 mMainThread.getApplicationThread(), getActivityToken(),
1145 service, service.resolveTypeIfNeeded(getContentResolver()),
1146 sd, flags);
1147 if (res < 0) {
1148 throw new SecurityException(
1149 "Not allowed to bind to service " + service);
1150 }
1151 return res != 0;
1152 } catch (RemoteException e) {
1153 return false;
1154 }
1155 }
1156
1157 @Override
1158 public void unbindService(ServiceConnection conn) {
1159 if (mPackageInfo != null) {
1160 IServiceConnection sd = mPackageInfo.forgetServiceDispatcher(
1161 getOuterContext(), conn);
1162 try {
1163 ActivityManagerNative.getDefault().unbindService(sd);
1164 } catch (RemoteException e) {
1165 }
1166 } else {
1167 throw new RuntimeException("Not supported in system context");
1168 }
1169 }
1170
1171 @Override
1172 public boolean startInstrumentation(ComponentName className,
1173 String profileFile, Bundle arguments) {
1174 try {
Dianne Hackborn9ecebbf2011-09-28 23:19:47 -04001175 if (arguments != null) {
1176 arguments.setAllowFds(false);
1177 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001178 return ActivityManagerNative.getDefault().startInstrumentation(
1179 className, profileFile, 0, arguments, null);
1180 } catch (RemoteException e) {
1181 // System has crashed, nothing we can do.
1182 }
1183 return false;
1184 }
1185
1186 @Override
1187 public Object getSystemService(String name) {
Brad Fitzpatrick224ba0c2010-11-12 12:22:15 -08001188 ServiceFetcher fetcher = SYSTEM_SERVICE_MAP.get(name);
1189 return fetcher == null ? null : fetcher.getService(this);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001190 }
1191
Dianne Hackborn8cc6a502009-08-05 21:29:42 -07001192 private WallpaperManager getWallpaperManager() {
Brad Fitzpatrick224ba0c2010-11-12 12:22:15 -08001193 return (WallpaperManager) WALLPAPER_FETCHER.getService(this);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001194 }
1195
Brad Fitzpatrick438d0592010-06-10 12:19:19 -07001196 /* package */ static DropBoxManager createDropBoxManager() {
1197 IBinder b = ServiceManager.getService(DROPBOX_SERVICE);
1198 IDropBoxManagerService service = IDropBoxManagerService.Stub.asInterface(b);
Brad Fitzpatrickec062f62010-11-03 09:56:54 -07001199 if (service == null) {
1200 // Don't return a DropBoxManager that will NPE upon use.
1201 // This also avoids caching a broken DropBoxManager in
1202 // getDropBoxManager during early boot, before the
1203 // DROPBOX_SERVICE is registered.
1204 return null;
1205 }
Brad Fitzpatrick438d0592010-06-10 12:19:19 -07001206 return new DropBoxManager(service);
1207 }
1208
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001209 @Override
1210 public int checkPermission(String permission, int pid, int uid) {
1211 if (permission == null) {
1212 throw new IllegalArgumentException("permission is null");
1213 }
1214
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001215 try {
1216 return ActivityManagerNative.getDefault().checkPermission(
1217 permission, pid, uid);
1218 } catch (RemoteException e) {
1219 return PackageManager.PERMISSION_DENIED;
1220 }
1221 }
1222
1223 @Override
1224 public int checkCallingPermission(String permission) {
1225 if (permission == null) {
1226 throw new IllegalArgumentException("permission is null");
1227 }
1228
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001229 int pid = Binder.getCallingPid();
1230 if (pid != Process.myPid()) {
Amith Yamasani742a6712011-05-04 14:49:28 -07001231 return checkPermission(permission, pid, Binder.getCallingUid());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001232 }
1233 return PackageManager.PERMISSION_DENIED;
1234 }
1235
1236 @Override
1237 public int checkCallingOrSelfPermission(String permission) {
1238 if (permission == null) {
1239 throw new IllegalArgumentException("permission is null");
1240 }
1241
1242 return checkPermission(permission, Binder.getCallingPid(),
1243 Binder.getCallingUid());
1244 }
1245
1246 private void enforce(
1247 String permission, int resultOfCheck,
1248 boolean selfToo, int uid, String message) {
1249 if (resultOfCheck != PackageManager.PERMISSION_GRANTED) {
1250 throw new SecurityException(
1251 (message != null ? (message + ": ") : "") +
1252 (selfToo
1253 ? "Neither user " + uid + " nor current process has "
1254 : "User " + uid + " does not have ") +
1255 permission +
1256 ".");
1257 }
1258 }
1259
1260 public void enforcePermission(
1261 String permission, int pid, int uid, String message) {
1262 enforce(permission,
1263 checkPermission(permission, pid, uid),
1264 false,
1265 uid,
1266 message);
1267 }
1268
1269 public void enforceCallingPermission(String permission, String message) {
1270 enforce(permission,
1271 checkCallingPermission(permission),
1272 false,
1273 Binder.getCallingUid(),
1274 message);
1275 }
1276
1277 public void enforceCallingOrSelfPermission(
1278 String permission, String message) {
1279 enforce(permission,
1280 checkCallingOrSelfPermission(permission),
1281 true,
1282 Binder.getCallingUid(),
1283 message);
1284 }
1285
1286 @Override
1287 public void grantUriPermission(String toPackage, Uri uri, int modeFlags) {
1288 try {
1289 ActivityManagerNative.getDefault().grantUriPermission(
1290 mMainThread.getApplicationThread(), toPackage, uri,
1291 modeFlags);
1292 } catch (RemoteException e) {
1293 }
1294 }
1295
1296 @Override
1297 public void revokeUriPermission(Uri uri, int modeFlags) {
1298 try {
1299 ActivityManagerNative.getDefault().revokeUriPermission(
1300 mMainThread.getApplicationThread(), uri,
1301 modeFlags);
1302 } catch (RemoteException e) {
1303 }
1304 }
1305
1306 @Override
1307 public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001308 try {
1309 return ActivityManagerNative.getDefault().checkUriPermission(
1310 uri, pid, uid, modeFlags);
1311 } catch (RemoteException e) {
1312 return PackageManager.PERMISSION_DENIED;
1313 }
1314 }
1315
1316 @Override
1317 public int checkCallingUriPermission(Uri uri, int modeFlags) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001318 int pid = Binder.getCallingPid();
1319 if (pid != Process.myPid()) {
1320 return checkUriPermission(uri, pid,
1321 Binder.getCallingUid(), modeFlags);
1322 }
1323 return PackageManager.PERMISSION_DENIED;
1324 }
1325
1326 @Override
1327 public int checkCallingOrSelfUriPermission(Uri uri, int modeFlags) {
1328 return checkUriPermission(uri, Binder.getCallingPid(),
1329 Binder.getCallingUid(), modeFlags);
1330 }
1331
1332 @Override
1333 public int checkUriPermission(Uri uri, String readPermission,
1334 String writePermission, int pid, int uid, int modeFlags) {
Mitsuru Oshima569076c2009-07-02 20:06:08 -07001335 if (DEBUG) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001336 Log.i("foo", "checkUriPermission: uri=" + uri + "readPermission="
1337 + readPermission + " writePermission=" + writePermission
1338 + " pid=" + pid + " uid=" + uid + " mode" + modeFlags);
1339 }
1340 if ((modeFlags&Intent.FLAG_GRANT_READ_URI_PERMISSION) != 0) {
1341 if (readPermission == null
1342 || checkPermission(readPermission, pid, uid)
1343 == PackageManager.PERMISSION_GRANTED) {
1344 return PackageManager.PERMISSION_GRANTED;
1345 }
1346 }
1347 if ((modeFlags&Intent.FLAG_GRANT_WRITE_URI_PERMISSION) != 0) {
1348 if (writePermission == null
1349 || checkPermission(writePermission, pid, uid)
1350 == PackageManager.PERMISSION_GRANTED) {
1351 return PackageManager.PERMISSION_GRANTED;
1352 }
1353 }
1354 return uri != null ? checkUriPermission(uri, pid, uid, modeFlags)
1355 : PackageManager.PERMISSION_DENIED;
1356 }
1357
1358 private String uriModeFlagToString(int uriModeFlags) {
1359 switch (uriModeFlags) {
1360 case Intent.FLAG_GRANT_READ_URI_PERMISSION |
1361 Intent.FLAG_GRANT_WRITE_URI_PERMISSION:
1362 return "read and write";
1363 case Intent.FLAG_GRANT_READ_URI_PERMISSION:
1364 return "read";
1365 case Intent.FLAG_GRANT_WRITE_URI_PERMISSION:
1366 return "write";
1367 }
1368 throw new IllegalArgumentException(
1369 "Unknown permission mode flags: " + uriModeFlags);
1370 }
1371
1372 private void enforceForUri(
1373 int modeFlags, int resultOfCheck, boolean selfToo,
1374 int uid, Uri uri, String message) {
1375 if (resultOfCheck != PackageManager.PERMISSION_GRANTED) {
1376 throw new SecurityException(
1377 (message != null ? (message + ": ") : "") +
1378 (selfToo
1379 ? "Neither user " + uid + " nor current process has "
1380 : "User " + uid + " does not have ") +
1381 uriModeFlagToString(modeFlags) +
1382 " permission on " +
1383 uri +
1384 ".");
1385 }
1386 }
1387
1388 public void enforceUriPermission(
1389 Uri uri, int pid, int uid, int modeFlags, String message) {
1390 enforceForUri(
1391 modeFlags, checkUriPermission(uri, pid, uid, modeFlags),
1392 false, uid, uri, message);
1393 }
1394
1395 public void enforceCallingUriPermission(
1396 Uri uri, int modeFlags, String message) {
1397 enforceForUri(
1398 modeFlags, checkCallingUriPermission(uri, modeFlags),
Amith Yamasani742a6712011-05-04 14:49:28 -07001399 false,
1400 Binder.getCallingUid(), uri, message);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001401 }
1402
1403 public void enforceCallingOrSelfUriPermission(
1404 Uri uri, int modeFlags, String message) {
1405 enforceForUri(
1406 modeFlags,
1407 checkCallingOrSelfUriPermission(uri, modeFlags), true,
1408 Binder.getCallingUid(), uri, message);
1409 }
1410
1411 public void enforceUriPermission(
1412 Uri uri, String readPermission, String writePermission,
1413 int pid, int uid, int modeFlags, String message) {
1414 enforceForUri(modeFlags,
1415 checkUriPermission(
1416 uri, readPermission, writePermission, pid, uid,
1417 modeFlags),
1418 false,
1419 uid,
1420 uri,
1421 message);
1422 }
1423
1424 @Override
1425 public Context createPackageContext(String packageName, int flags)
1426 throws PackageManager.NameNotFoundException {
1427 if (packageName.equals("system") || packageName.equals("android")) {
Dianne Hackborn21556372010-02-04 16:34:40 -08001428 return new ContextImpl(mMainThread.getSystemContext());
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001429 }
1430
Dianne Hackborn01e4cfc2010-06-24 15:07:24 -07001431 LoadedApk pi =
Dianne Hackborne2515ee2011-04-27 18:52:56 -04001432 mMainThread.getPackageInfo(packageName, mResources.getCompatibilityInfo(), flags);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001433 if (pi != null) {
Dianne Hackborn21556372010-02-04 16:34:40 -08001434 ContextImpl c = new ContextImpl();
Romain Guy870e09f2009-07-06 16:35:25 -07001435 c.mRestricted = (flags & CONTEXT_RESTRICTED) == CONTEXT_RESTRICTED;
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001436 c.init(pi, null, mMainThread, mResources, mBasePackageName);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001437 if (c.mResources != null) {
1438 return c;
1439 }
1440 }
1441
1442 // Should be a better exception.
1443 throw new PackageManager.NameNotFoundException(
1444 "Application package " + packageName + " not found");
1445 }
1446
Romain Guy870e09f2009-07-06 16:35:25 -07001447 @Override
1448 public boolean isRestricted() {
1449 return mRestricted;
1450 }
1451
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001452 private File getDataDirFile() {
1453 if (mPackageInfo != null) {
1454 return mPackageInfo.getDataDirFile();
1455 }
1456 throw new RuntimeException("Not supported in system context");
1457 }
1458
1459 @Override
1460 public File getDir(String name, int mode) {
1461 name = "app_" + name;
1462 File file = makeFilename(getDataDirFile(), name);
1463 if (!file.exists()) {
1464 file.mkdir();
1465 setFilePermissionsFromMode(file.getPath(), mode,
1466 FileUtils.S_IRWXU|FileUtils.S_IRWXG|FileUtils.S_IXOTH);
1467 }
1468 return file;
1469 }
1470
Dianne Hackborn21556372010-02-04 16:34:40 -08001471 static ContextImpl createSystemContext(ActivityThread mainThread) {
1472 ContextImpl context = new ContextImpl();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001473 context.init(Resources.getSystem(), mainThread);
1474 return context;
1475 }
1476
Dianne Hackborn21556372010-02-04 16:34:40 -08001477 ContextImpl() {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001478 mOuterContext = this;
1479 }
1480
1481 /**
1482 * Create a new ApplicationContext from an existing one. The new one
1483 * works and operates the same as the one it is copying.
1484 *
1485 * @param context Existing application context.
1486 */
Dianne Hackborn21556372010-02-04 16:34:40 -08001487 public ContextImpl(ContextImpl context) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001488 mPackageInfo = context.mPackageInfo;
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001489 mBasePackageName = context.mBasePackageName;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001490 mResources = context.mResources;
1491 mMainThread = context.mMainThread;
1492 mContentResolver = context.mContentResolver;
1493 mOuterContext = this;
1494 }
1495
Dianne Hackborn01e4cfc2010-06-24 15:07:24 -07001496 final void init(LoadedApk packageInfo,
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001497 IBinder activityToken, ActivityThread mainThread) {
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001498 init(packageInfo, activityToken, mainThread, null, null);
Mitsuru Oshimaba3ba572009-07-08 18:49:26 -07001499 }
1500
Dianne Hackborn01e4cfc2010-06-24 15:07:24 -07001501 final void init(LoadedApk packageInfo,
Mitsuru Oshimaba3ba572009-07-08 18:49:26 -07001502 IBinder activityToken, ActivityThread mainThread,
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001503 Resources container, String basePackageName) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001504 mPackageInfo = packageInfo;
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001505 mBasePackageName = basePackageName != null ? basePackageName : packageInfo.mPackageName;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001506 mResources = mPackageInfo.getResources(mainThread);
Mitsuru Oshimaba3ba572009-07-08 18:49:26 -07001507
Dianne Hackborn559a7872010-04-07 18:19:41 -07001508 if (mResources != null && container != null
1509 && container.getCompatibilityInfo().applicationScale !=
1510 mResources.getCompatibilityInfo().applicationScale) {
Mitsuru Oshimaba3ba572009-07-08 18:49:26 -07001511 if (DEBUG) {
1512 Log.d(TAG, "loaded context has different scaling. Using container's" +
1513 " compatiblity info:" + container.getDisplayMetrics());
1514 }
1515 mResources = mainThread.getTopLevelResources(
Dianne Hackborne2515ee2011-04-27 18:52:56 -04001516 mPackageInfo.getResDir(), container.getCompatibilityInfo());
Mitsuru Oshimaba3ba572009-07-08 18:49:26 -07001517 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001518 mMainThread = mainThread;
1519 mContentResolver = new ApplicationContentResolver(this, mainThread);
1520
1521 setActivityToken(activityToken);
1522 }
1523
1524 final void init(Resources resources, ActivityThread mainThread) {
1525 mPackageInfo = null;
Dianne Hackborn6c418d52011-06-29 14:05:33 -07001526 mBasePackageName = null;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001527 mResources = resources;
1528 mMainThread = mainThread;
1529 mContentResolver = new ApplicationContentResolver(this, mainThread);
1530 }
1531
1532 final void scheduleFinalCleanup(String who, String what) {
1533 mMainThread.scheduleContextCleanup(this, who, what);
1534 }
1535
1536 final void performFinalCleanup(String who, String what) {
1537 //Log.i(TAG, "Cleanup up context: " + this);
1538 mPackageInfo.removeContextRegistrations(getOuterContext(), who, what);
1539 }
1540
1541 final Context getReceiverRestrictedContext() {
1542 if (mReceiverRestrictedContext != null) {
1543 return mReceiverRestrictedContext;
1544 }
1545 return mReceiverRestrictedContext = new ReceiverRestrictedContext(getOuterContext());
1546 }
1547
1548 final void setActivityToken(IBinder token) {
1549 mActivityToken = token;
1550 }
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +02001551
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001552 final void setOuterContext(Context context) {
1553 mOuterContext = context;
1554 }
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +02001555
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001556 final Context getOuterContext() {
1557 return mOuterContext;
1558 }
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +02001559
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001560 final IBinder getActivityToken() {
1561 return mActivityToken;
1562 }
1563
Brad Fitzpatrickd3da4402010-11-10 08:27:11 -08001564 static void setFilePermissionsFromMode(String name, int mode,
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001565 int extraPermissions) {
1566 int perms = FileUtils.S_IRUSR|FileUtils.S_IWUSR
1567 |FileUtils.S_IRGRP|FileUtils.S_IWGRP
1568 |extraPermissions;
1569 if ((mode&MODE_WORLD_READABLE) != 0) {
1570 perms |= FileUtils.S_IROTH;
1571 }
1572 if ((mode&MODE_WORLD_WRITEABLE) != 0) {
1573 perms |= FileUtils.S_IWOTH;
1574 }
Mitsuru Oshima569076c2009-07-02 20:06:08 -07001575 if (DEBUG) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001576 Log.i(TAG, "File " + name + ": mode=0x" + Integer.toHexString(mode)
1577 + ", perms=0x" + Integer.toHexString(perms));
1578 }
1579 FileUtils.setPermissions(name, perms, -1, -1);
1580 }
1581
Oscar Montemayora8529f62009-11-18 10:14:20 -08001582 private File validateFilePath(String name, boolean createDirectory) {
1583 File dir;
1584 File f;
1585
1586 if (name.charAt(0) == File.separatorChar) {
1587 String dirPath = name.substring(0, name.lastIndexOf(File.separatorChar));
1588 dir = new File(dirPath);
1589 name = name.substring(name.lastIndexOf(File.separatorChar));
1590 f = new File(dir, name);
1591 } else {
1592 dir = getDatabasesDir();
1593 f = makeFilename(dir, name);
1594 }
1595
1596 if (createDirectory && !dir.isDirectory() && dir.mkdir()) {
1597 FileUtils.setPermissions(dir.getPath(),
1598 FileUtils.S_IRWXU|FileUtils.S_IRWXG|FileUtils.S_IXOTH,
1599 -1, -1);
1600 }
1601
1602 return f;
1603 }
1604
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001605 private File makeFilename(File base, String name) {
1606 if (name.indexOf(File.separatorChar) < 0) {
1607 return new File(base, name);
1608 }
1609 throw new IllegalArgumentException(
Oscar Montemayora8529f62009-11-18 10:14:20 -08001610 "File " + name + " contains a path separator");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001611 }
1612
1613 // ----------------------------------------------------------------------
1614 // ----------------------------------------------------------------------
1615 // ----------------------------------------------------------------------
1616
1617 private static final class ApplicationContentResolver extends ContentResolver {
Dianne Hackborncca1f0e2010-09-26 18:34:53 -07001618 public ApplicationContentResolver(Context context, ActivityThread mainThread) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001619 super(context);
1620 mMainThread = mainThread;
1621 }
1622
1623 @Override
Dianne Hackborncca1f0e2010-09-26 18:34:53 -07001624 protected IContentProvider acquireProvider(Context context, String name) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001625 return mMainThread.acquireProvider(context, name);
1626 }
1627
1628 @Override
Dianne Hackborncca1f0e2010-09-26 18:34:53 -07001629 protected IContentProvider acquireExistingProvider(Context context, String name) {
1630 return mMainThread.acquireExistingProvider(context, name);
1631 }
1632
1633 @Override
1634 public boolean releaseProvider(IContentProvider provider) {
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001635 return mMainThread.releaseProvider(provider);
1636 }
Christian Mehlmauer5f5acca2010-06-25 19:06:18 +02001637
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001638 private final ActivityThread mMainThread;
1639 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001640}