blob: 7edbed9428b821dd1ddf00418e09db743bd4873f [file] [log] [blame]
Brad Ebingerdc555b42019-12-09 16:12:57 -08001/*
2 * Copyright (C) 2019 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android;
18
19import static org.mockito.ArgumentMatchers.anyInt;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070020import static org.mockito.Mockito.doAnswer;
Brad Ebingerdc555b42019-12-09 16:12:57 -080021
Rafael Higuera Silva0b1ccf62022-02-11 17:58:27 +000022import android.content.AttributionSource;
Brad Ebingerdc555b42019-12-09 16:12:57 -080023import android.content.BroadcastReceiver;
James.cf Lincdad3862020-02-25 15:55:03 +080024import android.content.ContentResolver;
Brad Ebingerdc555b42019-12-09 16:12:57 -080025import android.content.Context;
26import android.content.Intent;
27import android.content.IntentFilter;
Rambo Wang7e3bc122021-03-23 09:24:38 -070028import android.content.pm.PackageManager;
29import android.os.Binder;
Brad Ebingerdc555b42019-12-09 16:12:57 -080030import android.os.Handler;
Hall Liu12feea22021-03-22 15:37:41 -070031import android.os.Looper;
Brad Ebingerdc555b42019-12-09 16:12:57 -080032import android.os.PersistableBundle;
Rafael Higuera Silva0b1ccf62022-02-11 17:58:27 +000033import android.os.Process;
Brad Ebingerdc555b42019-12-09 16:12:57 -080034import android.telecom.TelecomManager;
35import android.telephony.CarrierConfigManager;
36import android.telephony.SubscriptionManager;
37import android.telephony.TelephonyManager;
James.cf Lincdad3862020-02-25 15:55:03 +080038import android.telephony.ims.ImsManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080039import android.test.mock.MockContext;
Rambo Wang7e3bc122021-03-23 09:24:38 -070040import android.util.Log;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070041import android.util.SparseArray;
Brad Ebingerdc555b42019-12-09 16:12:57 -080042
43import org.mockito.Mock;
44import org.mockito.MockitoAnnotations;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070045import org.mockito.stubbing.Answer;
Brad Ebingerdc555b42019-12-09 16:12:57 -080046
Rambo Wang7e3bc122021-03-23 09:24:38 -070047import java.util.HashSet;
Brad Ebingera68a4972020-01-30 17:31:23 -080048import java.util.concurrent.Executor;
49
Brad Ebingerdc555b42019-12-09 16:12:57 -080050public class TestContext extends MockContext {
51
Rambo Wang7e3bc122021-03-23 09:24:38 -070052 private static final String TAG = "TestContext";
53 // Stub used to grant all permissions
54 public static final String STUB_PERMISSION_ENABLE_ALL = "stub_permission_enable_all";
55
Brad Ebingerdc555b42019-12-09 16:12:57 -080056 @Mock CarrierConfigManager mMockCarrierConfigManager;
57 @Mock TelecomManager mMockTelecomManager;
58 @Mock TelephonyManager mMockTelephonyManager;
59 @Mock SubscriptionManager mMockSubscriptionManager;
James.cf Lincdad3862020-02-25 15:55:03 +080060 @Mock ImsManager mMockImsManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080061
Brad Ebinger9c5578a2020-09-23 17:03:48 -070062 private SparseArray<PersistableBundle> mCarrierConfigs = new SparseArray<>();
Brad Ebingerdc555b42019-12-09 16:12:57 -080063
Rambo Wang7e3bc122021-03-23 09:24:38 -070064 private final HashSet<String> mPermissionTable = new HashSet<>();
65
Brad Ebingerdc555b42019-12-09 16:12:57 -080066 public TestContext() {
67 MockitoAnnotations.initMocks(this);
Brad Ebinger9c5578a2020-09-23 17:03:48 -070068 doAnswer((Answer<PersistableBundle>) invocation -> {
69 int subId = (int) invocation.getArguments()[0];
70 if (subId < 0) {
71 return new PersistableBundle();
72 }
73 PersistableBundle b = mCarrierConfigs.get(subId);
74
75 return (b != null ? b : new PersistableBundle());
76 }).when(mMockCarrierConfigManager).getConfigForSubId(anyInt());
Brad Ebingerdc555b42019-12-09 16:12:57 -080077 }
78
79 @Override
Brad Ebingera68a4972020-01-30 17:31:23 -080080 public Executor getMainExecutor() {
81 // Just run on current thread
82 return Runnable::run;
83 }
84
85 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -080086 public Context getApplicationContext() {
87 return this;
88 }
89
90 @Override
91 public String getPackageName() {
92 return "com.android.phone.tests";
93 }
94
95 @Override
Philip P. Moltmann8d34f0c2020-03-05 16:24:02 -080096 public String getAttributionTag() {
Brad Ebingerdc555b42019-12-09 16:12:57 -080097 return "";
98 }
99
100 @Override
Rafael Higuera Silva0b1ccf62022-02-11 17:58:27 +0000101 public AttributionSource getAttributionSource() {
102 return new AttributionSource(Process.myUid(), getPackageName(), "");
103 }
104
105 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -0800106 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter) {
107 return null;
108 }
109
110 @Override
111 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter, int flags) {
112 return null;
113 }
114
115 @Override
116 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter,
117 String broadcastPermission, Handler scheduler) {
118 return null;
119 }
120
121 @Override
122 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter,
123 String broadcastPermission, Handler scheduler, int flags) {
124 return null;
125 }
126
127 @Override
James.cf Lincdad3862020-02-25 15:55:03 +0800128 public ContentResolver getContentResolver() {
129 return null;
130 }
131
132 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -0800133 public Object getSystemService(String name) {
134 switch (name) {
135 case (Context.CARRIER_CONFIG_SERVICE) : {
136 return mMockCarrierConfigManager;
137 }
138 case (Context.TELECOM_SERVICE) : {
139 return mMockTelecomManager;
140 }
141 case (Context.TELEPHONY_SERVICE) : {
142 return mMockTelephonyManager;
143 }
144 case (Context.TELEPHONY_SUBSCRIPTION_SERVICE) : {
145 return mMockSubscriptionManager;
146 }
James.cf Lincdad3862020-02-25 15:55:03 +0800147 case(Context.TELEPHONY_IMS_SERVICE) : {
148 return mMockImsManager;
149 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800150 }
151 return null;
152 }
153
154 @Override
155 public String getSystemServiceName(Class<?> serviceClass) {
156 if (serviceClass == CarrierConfigManager.class) {
157 return Context.CARRIER_CONFIG_SERVICE;
158 }
159 if (serviceClass == TelecomManager.class) {
160 return Context.TELECOM_SERVICE;
161 }
162 if (serviceClass == TelephonyManager.class) {
163 return Context.TELEPHONY_SERVICE;
164 }
165 if (serviceClass == SubscriptionManager.class) {
166 return Context.TELEPHONY_SUBSCRIPTION_SERVICE;
167 }
168 return null;
169 }
170
Hall Liu12feea22021-03-22 15:37:41 -0700171 @Override
172 public Handler getMainThreadHandler() {
173 return new Handler(Looper.getMainLooper());
174 }
175
Brad Ebinger9c5578a2020-09-23 17:03:48 -0700176 /**
177 * @return CarrierConfig PersistableBundle for the subscription specified.
178 */
179 public PersistableBundle getCarrierConfig(int subId) {
180 PersistableBundle b = mCarrierConfigs.get(subId);
181 if (b == null) {
182 b = new PersistableBundle();
183 mCarrierConfigs.put(subId, b);
184 }
185 return b;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800186 }
Rambo Wang7e3bc122021-03-23 09:24:38 -0700187
188 @Override
189 public void enforceCallingOrSelfPermission(String permission, String message) {
190 if (checkCallingOrSelfPermission(permission) != PackageManager.PERMISSION_GRANTED) {
191 throw new SecurityException(permission + " denied: " + message);
192 }
193 }
194
195 @Override
196 public void enforcePermission(String permission, int pid, int uid, String message) {
197 enforceCallingOrSelfPermission(permission, message);
198 }
199
200 @Override
201 public void enforceCallingPermission(String permission, String message) {
202 enforceCallingOrSelfPermission(permission, message);
203 }
204
205 @Override
206 public int checkCallingOrSelfPermission(String permission) {
207 return checkPermission(permission, Binder.getCallingPid(), Binder.getCallingUid());
208 }
209
210 @Override
211 public int checkPermission(String permission, int pid, int uid) {
212 synchronized (mPermissionTable) {
213 if (mPermissionTable.contains(permission)
214 || mPermissionTable.contains(STUB_PERMISSION_ENABLE_ALL)) {
215 logd("checkCallingOrSelfPermission: " + permission + " return GRANTED");
216 return PackageManager.PERMISSION_GRANTED;
217 } else {
218 logd("checkCallingOrSelfPermission: " + permission + " return DENIED");
219 return PackageManager.PERMISSION_DENIED;
220 }
221 }
222 }
223
224 public void grantPermission(String permission) {
225 synchronized (mPermissionTable) {
226 if (mPermissionTable != null && permission != null) {
227 mPermissionTable.remove(STUB_PERMISSION_ENABLE_ALL);
228 mPermissionTable.add(permission);
229 }
230 }
231 }
232
233 public void revokePermission(String permission) {
234 synchronized (mPermissionTable) {
235 if (mPermissionTable != null && permission != null) {
236 mPermissionTable.remove(permission);
237 }
238 }
239 }
240
241 public void revokeAllPermissions() {
242 synchronized (mPermissionTable) {
243 mPermissionTable.clear();
244 }
245 }
246
247 private static void logd(String s) {
248 Log.d(TAG, s);
249 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800250}