blob: a684ef54e9bcd6fa4e7d103663afc5276ad695ae [file] [log] [blame]
Brad Ebingerdc555b42019-12-09 16:12:57 -08001/*
2 * Copyright (C) 2019 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android;
18
19import static org.mockito.ArgumentMatchers.anyInt;
Brad Ebinger6c53e7f2023-01-27 16:26:44 -080020import static org.mockito.ArgumentMatchers.anyString;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070021import static org.mockito.Mockito.doAnswer;
Tomasz Wasilczykd78e8702024-03-14 11:11:46 -070022import static org.mockito.Mockito.when;
Brad Ebingerdc555b42019-12-09 16:12:57 -080023
Rafael Higuera Silva0b1ccf62022-02-11 17:58:27 +000024import android.content.AttributionSource;
Brad Ebingerdc555b42019-12-09 16:12:57 -080025import android.content.BroadcastReceiver;
James.cf Lincdad3862020-02-25 15:55:03 +080026import android.content.ContentResolver;
Brad Ebingerdc555b42019-12-09 16:12:57 -080027import android.content.Context;
28import android.content.Intent;
29import android.content.IntentFilter;
Rambo Wang7e3bc122021-03-23 09:24:38 -070030import android.content.pm.PackageManager;
31import android.os.Binder;
Brad Ebingerdc555b42019-12-09 16:12:57 -080032import android.os.Handler;
Hall Liu12feea22021-03-22 15:37:41 -070033import android.os.Looper;
Brad Ebingerdc555b42019-12-09 16:12:57 -080034import android.os.PersistableBundle;
Rafael Higuera Silva0b1ccf62022-02-11 17:58:27 +000035import android.os.Process;
Jack Yu58d04bd2024-09-10 17:32:39 -070036import android.os.UserHandle;
Gil Cukierman6dac5eb2022-09-19 16:09:04 +000037import android.os.UserManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080038import android.telecom.TelecomManager;
39import android.telephony.CarrierConfigManager;
40import android.telephony.SubscriptionManager;
41import android.telephony.TelephonyManager;
James.cf Lincdad3862020-02-25 15:55:03 +080042import android.telephony.ims.ImsManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080043import android.test.mock.MockContext;
Rambo Wang7e3bc122021-03-23 09:24:38 -070044import android.util.Log;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070045import android.util.SparseArray;
Brad Ebingerdc555b42019-12-09 16:12:57 -080046
47import org.mockito.Mock;
48import org.mockito.MockitoAnnotations;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070049import org.mockito.stubbing.Answer;
Brad Ebingerdc555b42019-12-09 16:12:57 -080050
Rambo Wang7e3bc122021-03-23 09:24:38 -070051import java.util.HashSet;
Brad Ebingera68a4972020-01-30 17:31:23 -080052import java.util.concurrent.Executor;
53
Brad Ebingerdc555b42019-12-09 16:12:57 -080054public class TestContext extends MockContext {
55
Rambo Wang7e3bc122021-03-23 09:24:38 -070056 private static final String TAG = "TestContext";
57 // Stub used to grant all permissions
58 public static final String STUB_PERMISSION_ENABLE_ALL = "stub_permission_enable_all";
59
Brad Ebingerdc555b42019-12-09 16:12:57 -080060 @Mock CarrierConfigManager mMockCarrierConfigManager;
61 @Mock TelecomManager mMockTelecomManager;
62 @Mock TelephonyManager mMockTelephonyManager;
63 @Mock SubscriptionManager mMockSubscriptionManager;
James.cf Lincdad3862020-02-25 15:55:03 +080064 @Mock ImsManager mMockImsManager;
Gil Cukierman6dac5eb2022-09-19 16:09:04 +000065 @Mock UserManager mMockUserManager;
Tomasz Wasilczykd78e8702024-03-14 11:11:46 -070066 @Mock PackageManager mPackageManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080067
Sarah Chin71462482022-11-18 02:25:25 -080068 private final SparseArray<PersistableBundle> mCarrierConfigs = new SparseArray<>();
69
70 private Intent mIntent;
71
72 private BroadcastReceiver mReceiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -080073
Rambo Wang7e3bc122021-03-23 09:24:38 -070074 private final HashSet<String> mPermissionTable = new HashSet<>();
75
Brad Ebingerdc555b42019-12-09 16:12:57 -080076 public TestContext() {
77 MockitoAnnotations.initMocks(this);
Brad Ebinger9c5578a2020-09-23 17:03:48 -070078 doAnswer((Answer<PersistableBundle>) invocation -> {
79 int subId = (int) invocation.getArguments()[0];
Brad Ebinger6c53e7f2023-01-27 16:26:44 -080080 return getTestConfigs(subId);
Brad Ebinger9c5578a2020-09-23 17:03:48 -070081 }).when(mMockCarrierConfigManager).getConfigForSubId(anyInt());
Brad Ebinger6c53e7f2023-01-27 16:26:44 -080082 doAnswer((Answer<PersistableBundle>) invocation -> {
83 int subId = (int) invocation.getArguments()[0];
84 return getTestConfigs(subId);
85 }).when(mMockCarrierConfigManager).getConfigForSubId(anyInt(), anyString());
Tomasz Wasilczykd78e8702024-03-14 11:11:46 -070086 when(mPackageManager.hasSystemFeature(anyString())).thenReturn(true);
Brad Ebingerdc555b42019-12-09 16:12:57 -080087 }
88
89 @Override
Brad Ebingera68a4972020-01-30 17:31:23 -080090 public Executor getMainExecutor() {
91 // Just run on current thread
92 return Runnable::run;
93 }
94
95 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -080096 public Context getApplicationContext() {
97 return this;
98 }
99
100 @Override
101 public String getPackageName() {
102 return "com.android.phone.tests";
103 }
104
105 @Override
Tomasz Wasilczyk33c44522024-11-07 21:18:16 -0800106 public String getOpPackageName() {
107 return getPackageName();
108 }
109
110 @Override
Philip P. Moltmann8d34f0c2020-03-05 16:24:02 -0800111 public String getAttributionTag() {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800112 return "";
113 }
114
115 @Override
Rafael Higuera Silva0b1ccf62022-02-11 17:58:27 +0000116 public AttributionSource getAttributionSource() {
117 return new AttributionSource(Process.myUid(), getPackageName(), "");
118 }
119
120 @Override
Jack Yu58d04bd2024-09-10 17:32:39 -0700121 public void startActivityAsUser(Intent intent, UserHandle user) {
122 throw new UnsupportedOperationException();
123 }
124
125 @Override
Sarah Chin71462482022-11-18 02:25:25 -0800126 public void sendBroadcast(Intent intent) {
127 mIntent = intent;
128 }
129
130 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -0800131 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter) {
Sarah Chin71462482022-11-18 02:25:25 -0800132 mReceiver = receiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800133 return null;
134 }
135
136 @Override
137 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter, int flags) {
Sarah Chin71462482022-11-18 02:25:25 -0800138 mReceiver = receiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800139 return null;
140 }
141
142 @Override
143 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter,
144 String broadcastPermission, Handler scheduler) {
Sarah Chin71462482022-11-18 02:25:25 -0800145 mReceiver = receiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800146 return null;
147 }
148
149 @Override
150 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter,
151 String broadcastPermission, Handler scheduler, int flags) {
Sarah Chin71462482022-11-18 02:25:25 -0800152 mReceiver = receiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800153 return null;
154 }
155
156 @Override
Sarah Chin71462482022-11-18 02:25:25 -0800157 public void unregisterReceiver(BroadcastReceiver receiver) {
158 mReceiver = null;
159 }
160
161 @Override
Tomasz Wasilczykd78e8702024-03-14 11:11:46 -0700162 public PackageManager getPackageManager() {
163 return mPackageManager;
164 }
165
166 @Override
James.cf Lincdad3862020-02-25 15:55:03 +0800167 public ContentResolver getContentResolver() {
168 return null;
169 }
170
171 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -0800172 public Object getSystemService(String name) {
173 switch (name) {
Sarah Chin71462482022-11-18 02:25:25 -0800174 case Context.CARRIER_CONFIG_SERVICE: {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800175 return mMockCarrierConfigManager;
176 }
Sarah Chin71462482022-11-18 02:25:25 -0800177 case Context.TELECOM_SERVICE: {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800178 return mMockTelecomManager;
179 }
Sarah Chin71462482022-11-18 02:25:25 -0800180 case Context.TELEPHONY_SERVICE: {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800181 return mMockTelephonyManager;
182 }
Sarah Chin71462482022-11-18 02:25:25 -0800183 case Context.TELEPHONY_SUBSCRIPTION_SERVICE: {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800184 return mMockSubscriptionManager;
185 }
Sarah Chin71462482022-11-18 02:25:25 -0800186 case Context.TELEPHONY_IMS_SERVICE: {
James.cf Lincdad3862020-02-25 15:55:03 +0800187 return mMockImsManager;
188 }
Sarah Chin71462482022-11-18 02:25:25 -0800189 case Context.USER_SERVICE: {
Gil Cukierman6dac5eb2022-09-19 16:09:04 +0000190 return mMockUserManager;
191 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800192 }
193 return null;
194 }
195
196 @Override
197 public String getSystemServiceName(Class<?> serviceClass) {
198 if (serviceClass == CarrierConfigManager.class) {
199 return Context.CARRIER_CONFIG_SERVICE;
200 }
201 if (serviceClass == TelecomManager.class) {
202 return Context.TELECOM_SERVICE;
203 }
204 if (serviceClass == TelephonyManager.class) {
205 return Context.TELEPHONY_SERVICE;
206 }
207 if (serviceClass == SubscriptionManager.class) {
208 return Context.TELEPHONY_SUBSCRIPTION_SERVICE;
209 }
Sarah Chin71462482022-11-18 02:25:25 -0800210 if (serviceClass == ImsManager.class) {
211 return Context.TELEPHONY_IMS_SERVICE;
212 }
Gil Cukierman6dac5eb2022-09-19 16:09:04 +0000213 if (serviceClass == UserManager.class) {
214 return Context.USER_SERVICE;
215 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800216 return null;
217 }
218
Hall Liu12feea22021-03-22 15:37:41 -0700219 @Override
Tomasz Wasilczyk310544d2024-10-24 14:08:18 -0700220 public Looper getMainLooper() {
221 return Looper.getMainLooper();
222 }
223
224 @Override
Hall Liu12feea22021-03-22 15:37:41 -0700225 public Handler getMainThreadHandler() {
226 return new Handler(Looper.getMainLooper());
227 }
228
Brad Ebinger9c5578a2020-09-23 17:03:48 -0700229 /**
230 * @return CarrierConfig PersistableBundle for the subscription specified.
231 */
232 public PersistableBundle getCarrierConfig(int subId) {
233 PersistableBundle b = mCarrierConfigs.get(subId);
234 if (b == null) {
235 b = new PersistableBundle();
236 mCarrierConfigs.put(subId, b);
237 }
238 return b;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800239 }
Rambo Wang7e3bc122021-03-23 09:24:38 -0700240
241 @Override
242 public void enforceCallingOrSelfPermission(String permission, String message) {
243 if (checkCallingOrSelfPermission(permission) != PackageManager.PERMISSION_GRANTED) {
244 throw new SecurityException(permission + " denied: " + message);
245 }
246 }
247
248 @Override
249 public void enforcePermission(String permission, int pid, int uid, String message) {
250 enforceCallingOrSelfPermission(permission, message);
251 }
252
253 @Override
254 public void enforceCallingPermission(String permission, String message) {
255 enforceCallingOrSelfPermission(permission, message);
256 }
257
258 @Override
259 public int checkCallingOrSelfPermission(String permission) {
260 return checkPermission(permission, Binder.getCallingPid(), Binder.getCallingUid());
261 }
262
263 @Override
264 public int checkPermission(String permission, int pid, int uid) {
265 synchronized (mPermissionTable) {
266 if (mPermissionTable.contains(permission)
267 || mPermissionTable.contains(STUB_PERMISSION_ENABLE_ALL)) {
268 logd("checkCallingOrSelfPermission: " + permission + " return GRANTED");
269 return PackageManager.PERMISSION_GRANTED;
270 } else {
271 logd("checkCallingOrSelfPermission: " + permission + " return DENIED");
272 return PackageManager.PERMISSION_DENIED;
273 }
274 }
275 }
276
277 public void grantPermission(String permission) {
278 synchronized (mPermissionTable) {
Brad Ebinger6c53e7f2023-01-27 16:26:44 -0800279 if (permission == null) return;
280 mPermissionTable.remove(STUB_PERMISSION_ENABLE_ALL);
281 mPermissionTable.add(permission);
Rambo Wang7e3bc122021-03-23 09:24:38 -0700282 }
283 }
284
285 public void revokePermission(String permission) {
286 synchronized (mPermissionTable) {
Brad Ebinger6c53e7f2023-01-27 16:26:44 -0800287 if (permission == null) return;
288 mPermissionTable.remove(permission);
Rambo Wang7e3bc122021-03-23 09:24:38 -0700289 }
290 }
291
292 public void revokeAllPermissions() {
293 synchronized (mPermissionTable) {
294 mPermissionTable.clear();
295 }
296 }
297
Sarah Chin71462482022-11-18 02:25:25 -0800298 public Intent getBroadcast() {
299 return mIntent;
300 }
301
302 public BroadcastReceiver getBroadcastReceiver() {
303 return mReceiver;
304 }
305
Brad Ebinger6c53e7f2023-01-27 16:26:44 -0800306 private PersistableBundle getTestConfigs(int subId) {
307 if (subId < 0) {
308 return new PersistableBundle();
309 }
310 PersistableBundle b = getCarrierConfig(subId);
311 return (b != null ? b : new PersistableBundle());
312 }
313
Rambo Wang7e3bc122021-03-23 09:24:38 -0700314 private static void logd(String s) {
315 Log.d(TAG, s);
316 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800317}