blob: 545646942e689f39910a555c06d104171eb6b938 [file] [log] [blame]
Brad Ebingerdc555b42019-12-09 16:12:57 -08001/*
2 * Copyright (C) 2019 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android;
18
19import static org.mockito.ArgumentMatchers.anyInt;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070020import static org.mockito.Mockito.doAnswer;
Brad Ebingerdc555b42019-12-09 16:12:57 -080021
22import android.content.BroadcastReceiver;
James.cf Lincdad3862020-02-25 15:55:03 +080023import android.content.ContentResolver;
Brad Ebingerdc555b42019-12-09 16:12:57 -080024import android.content.Context;
25import android.content.Intent;
26import android.content.IntentFilter;
Rambo Wang7e3bc122021-03-23 09:24:38 -070027import android.content.pm.PackageManager;
28import android.os.Binder;
Brad Ebingerdc555b42019-12-09 16:12:57 -080029import android.os.Handler;
Hall Liu12feea22021-03-22 15:37:41 -070030import android.os.Looper;
Brad Ebingerdc555b42019-12-09 16:12:57 -080031import android.os.PersistableBundle;
32import android.telecom.TelecomManager;
33import android.telephony.CarrierConfigManager;
34import android.telephony.SubscriptionManager;
35import android.telephony.TelephonyManager;
James.cf Lincdad3862020-02-25 15:55:03 +080036import android.telephony.ims.ImsManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080037import android.test.mock.MockContext;
Rambo Wang7e3bc122021-03-23 09:24:38 -070038import android.util.Log;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070039import android.util.SparseArray;
Brad Ebingerdc555b42019-12-09 16:12:57 -080040
41import org.mockito.Mock;
42import org.mockito.MockitoAnnotations;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070043import org.mockito.stubbing.Answer;
Brad Ebingerdc555b42019-12-09 16:12:57 -080044
Rambo Wang7e3bc122021-03-23 09:24:38 -070045import java.util.HashSet;
Brad Ebingera68a4972020-01-30 17:31:23 -080046import java.util.concurrent.Executor;
47
Brad Ebingerdc555b42019-12-09 16:12:57 -080048public class TestContext extends MockContext {
49
Rambo Wang7e3bc122021-03-23 09:24:38 -070050 private static final String TAG = "TestContext";
51 // Stub used to grant all permissions
52 public static final String STUB_PERMISSION_ENABLE_ALL = "stub_permission_enable_all";
53
Brad Ebingerdc555b42019-12-09 16:12:57 -080054 @Mock CarrierConfigManager mMockCarrierConfigManager;
55 @Mock TelecomManager mMockTelecomManager;
56 @Mock TelephonyManager mMockTelephonyManager;
57 @Mock SubscriptionManager mMockSubscriptionManager;
James.cf Lincdad3862020-02-25 15:55:03 +080058 @Mock ImsManager mMockImsManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080059
Brad Ebinger9c5578a2020-09-23 17:03:48 -070060 private SparseArray<PersistableBundle> mCarrierConfigs = new SparseArray<>();
Brad Ebingerdc555b42019-12-09 16:12:57 -080061
Rambo Wang7e3bc122021-03-23 09:24:38 -070062 private final HashSet<String> mPermissionTable = new HashSet<>();
63
Brad Ebingerdc555b42019-12-09 16:12:57 -080064 public TestContext() {
65 MockitoAnnotations.initMocks(this);
Brad Ebinger9c5578a2020-09-23 17:03:48 -070066 doAnswer((Answer<PersistableBundle>) invocation -> {
67 int subId = (int) invocation.getArguments()[0];
68 if (subId < 0) {
69 return new PersistableBundle();
70 }
71 PersistableBundle b = mCarrierConfigs.get(subId);
72
73 return (b != null ? b : new PersistableBundle());
74 }).when(mMockCarrierConfigManager).getConfigForSubId(anyInt());
Brad Ebingerdc555b42019-12-09 16:12:57 -080075 }
76
77 @Override
Brad Ebingera68a4972020-01-30 17:31:23 -080078 public Executor getMainExecutor() {
79 // Just run on current thread
80 return Runnable::run;
81 }
82
83 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -080084 public Context getApplicationContext() {
85 return this;
86 }
87
88 @Override
89 public String getPackageName() {
90 return "com.android.phone.tests";
91 }
92
93 @Override
Philip P. Moltmann8d34f0c2020-03-05 16:24:02 -080094 public String getAttributionTag() {
Brad Ebingerdc555b42019-12-09 16:12:57 -080095 return "";
96 }
97
98 @Override
99 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter) {
100 return null;
101 }
102
103 @Override
104 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter, int flags) {
105 return null;
106 }
107
108 @Override
109 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter,
110 String broadcastPermission, Handler scheduler) {
111 return null;
112 }
113
114 @Override
115 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter,
116 String broadcastPermission, Handler scheduler, int flags) {
117 return null;
118 }
119
120 @Override
James.cf Lincdad3862020-02-25 15:55:03 +0800121 public ContentResolver getContentResolver() {
122 return null;
123 }
124
125 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -0800126 public Object getSystemService(String name) {
127 switch (name) {
128 case (Context.CARRIER_CONFIG_SERVICE) : {
129 return mMockCarrierConfigManager;
130 }
131 case (Context.TELECOM_SERVICE) : {
132 return mMockTelecomManager;
133 }
134 case (Context.TELEPHONY_SERVICE) : {
135 return mMockTelephonyManager;
136 }
137 case (Context.TELEPHONY_SUBSCRIPTION_SERVICE) : {
138 return mMockSubscriptionManager;
139 }
James.cf Lincdad3862020-02-25 15:55:03 +0800140 case(Context.TELEPHONY_IMS_SERVICE) : {
141 return mMockImsManager;
142 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800143 }
144 return null;
145 }
146
147 @Override
148 public String getSystemServiceName(Class<?> serviceClass) {
149 if (serviceClass == CarrierConfigManager.class) {
150 return Context.CARRIER_CONFIG_SERVICE;
151 }
152 if (serviceClass == TelecomManager.class) {
153 return Context.TELECOM_SERVICE;
154 }
155 if (serviceClass == TelephonyManager.class) {
156 return Context.TELEPHONY_SERVICE;
157 }
158 if (serviceClass == SubscriptionManager.class) {
159 return Context.TELEPHONY_SUBSCRIPTION_SERVICE;
160 }
161 return null;
162 }
163
Hall Liu12feea22021-03-22 15:37:41 -0700164 @Override
165 public Handler getMainThreadHandler() {
166 return new Handler(Looper.getMainLooper());
167 }
168
Brad Ebinger9c5578a2020-09-23 17:03:48 -0700169 /**
170 * @return CarrierConfig PersistableBundle for the subscription specified.
171 */
172 public PersistableBundle getCarrierConfig(int subId) {
173 PersistableBundle b = mCarrierConfigs.get(subId);
174 if (b == null) {
175 b = new PersistableBundle();
176 mCarrierConfigs.put(subId, b);
177 }
178 return b;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800179 }
Rambo Wang7e3bc122021-03-23 09:24:38 -0700180
181 @Override
182 public void enforceCallingOrSelfPermission(String permission, String message) {
183 if (checkCallingOrSelfPermission(permission) != PackageManager.PERMISSION_GRANTED) {
184 throw new SecurityException(permission + " denied: " + message);
185 }
186 }
187
188 @Override
189 public void enforcePermission(String permission, int pid, int uid, String message) {
190 enforceCallingOrSelfPermission(permission, message);
191 }
192
193 @Override
194 public void enforceCallingPermission(String permission, String message) {
195 enforceCallingOrSelfPermission(permission, message);
196 }
197
198 @Override
199 public int checkCallingOrSelfPermission(String permission) {
200 return checkPermission(permission, Binder.getCallingPid(), Binder.getCallingUid());
201 }
202
203 @Override
204 public int checkPermission(String permission, int pid, int uid) {
205 synchronized (mPermissionTable) {
206 if (mPermissionTable.contains(permission)
207 || mPermissionTable.contains(STUB_PERMISSION_ENABLE_ALL)) {
208 logd("checkCallingOrSelfPermission: " + permission + " return GRANTED");
209 return PackageManager.PERMISSION_GRANTED;
210 } else {
211 logd("checkCallingOrSelfPermission: " + permission + " return DENIED");
212 return PackageManager.PERMISSION_DENIED;
213 }
214 }
215 }
216
217 public void grantPermission(String permission) {
218 synchronized (mPermissionTable) {
219 if (mPermissionTable != null && permission != null) {
220 mPermissionTable.remove(STUB_PERMISSION_ENABLE_ALL);
221 mPermissionTable.add(permission);
222 }
223 }
224 }
225
226 public void revokePermission(String permission) {
227 synchronized (mPermissionTable) {
228 if (mPermissionTable != null && permission != null) {
229 mPermissionTable.remove(permission);
230 }
231 }
232 }
233
234 public void revokeAllPermissions() {
235 synchronized (mPermissionTable) {
236 mPermissionTable.clear();
237 }
238 }
239
240 private static void logd(String s) {
241 Log.d(TAG, s);
242 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800243}