blob: 720d235b2133d26f9ff3af3b17d9643fd40dc863 [file] [log] [blame]
Brad Ebingerdc555b42019-12-09 16:12:57 -08001/*
2 * Copyright (C) 2019 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android;
18
19import static org.mockito.ArgumentMatchers.anyInt;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070020import static org.mockito.Mockito.doAnswer;
Brad Ebingerdc555b42019-12-09 16:12:57 -080021
Rafael Higuera Silva0b1ccf62022-02-11 17:58:27 +000022import android.content.AttributionSource;
Brad Ebingerdc555b42019-12-09 16:12:57 -080023import android.content.BroadcastReceiver;
James.cf Lincdad3862020-02-25 15:55:03 +080024import android.content.ContentResolver;
Brad Ebingerdc555b42019-12-09 16:12:57 -080025import android.content.Context;
26import android.content.Intent;
27import android.content.IntentFilter;
Rambo Wang7e3bc122021-03-23 09:24:38 -070028import android.content.pm.PackageManager;
29import android.os.Binder;
Brad Ebingerdc555b42019-12-09 16:12:57 -080030import android.os.Handler;
Hall Liu12feea22021-03-22 15:37:41 -070031import android.os.Looper;
Brad Ebingerdc555b42019-12-09 16:12:57 -080032import android.os.PersistableBundle;
Rafael Higuera Silva0b1ccf62022-02-11 17:58:27 +000033import android.os.Process;
Gil Cukierman6dac5eb2022-09-19 16:09:04 +000034import android.os.UserManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080035import android.telecom.TelecomManager;
36import android.telephony.CarrierConfigManager;
37import android.telephony.SubscriptionManager;
38import android.telephony.TelephonyManager;
James.cf Lincdad3862020-02-25 15:55:03 +080039import android.telephony.ims.ImsManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080040import android.test.mock.MockContext;
Rambo Wang7e3bc122021-03-23 09:24:38 -070041import android.util.Log;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070042import android.util.SparseArray;
Brad Ebingerdc555b42019-12-09 16:12:57 -080043
44import org.mockito.Mock;
45import org.mockito.MockitoAnnotations;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070046import org.mockito.stubbing.Answer;
Brad Ebingerdc555b42019-12-09 16:12:57 -080047
Rambo Wang7e3bc122021-03-23 09:24:38 -070048import java.util.HashSet;
Brad Ebingera68a4972020-01-30 17:31:23 -080049import java.util.concurrent.Executor;
50
Brad Ebingerdc555b42019-12-09 16:12:57 -080051public class TestContext extends MockContext {
52
Rambo Wang7e3bc122021-03-23 09:24:38 -070053 private static final String TAG = "TestContext";
54 // Stub used to grant all permissions
55 public static final String STUB_PERMISSION_ENABLE_ALL = "stub_permission_enable_all";
56
Brad Ebingerdc555b42019-12-09 16:12:57 -080057 @Mock CarrierConfigManager mMockCarrierConfigManager;
58 @Mock TelecomManager mMockTelecomManager;
59 @Mock TelephonyManager mMockTelephonyManager;
60 @Mock SubscriptionManager mMockSubscriptionManager;
James.cf Lincdad3862020-02-25 15:55:03 +080061 @Mock ImsManager mMockImsManager;
Gil Cukierman6dac5eb2022-09-19 16:09:04 +000062 @Mock UserManager mMockUserManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080063
Sarah Chin71462482022-11-18 02:25:25 -080064 private final SparseArray<PersistableBundle> mCarrierConfigs = new SparseArray<>();
65
66 private Intent mIntent;
67
68 private BroadcastReceiver mReceiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -080069
Rambo Wang7e3bc122021-03-23 09:24:38 -070070 private final HashSet<String> mPermissionTable = new HashSet<>();
71
Brad Ebingerdc555b42019-12-09 16:12:57 -080072 public TestContext() {
73 MockitoAnnotations.initMocks(this);
Brad Ebinger9c5578a2020-09-23 17:03:48 -070074 doAnswer((Answer<PersistableBundle>) invocation -> {
75 int subId = (int) invocation.getArguments()[0];
76 if (subId < 0) {
77 return new PersistableBundle();
78 }
79 PersistableBundle b = mCarrierConfigs.get(subId);
80
81 return (b != null ? b : new PersistableBundle());
82 }).when(mMockCarrierConfigManager).getConfigForSubId(anyInt());
Brad Ebingerdc555b42019-12-09 16:12:57 -080083 }
84
85 @Override
Brad Ebingera68a4972020-01-30 17:31:23 -080086 public Executor getMainExecutor() {
87 // Just run on current thread
88 return Runnable::run;
89 }
90
91 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -080092 public Context getApplicationContext() {
93 return this;
94 }
95
96 @Override
97 public String getPackageName() {
98 return "com.android.phone.tests";
99 }
100
101 @Override
Philip P. Moltmann8d34f0c2020-03-05 16:24:02 -0800102 public String getAttributionTag() {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800103 return "";
104 }
105
106 @Override
Rafael Higuera Silva0b1ccf62022-02-11 17:58:27 +0000107 public AttributionSource getAttributionSource() {
108 return new AttributionSource(Process.myUid(), getPackageName(), "");
109 }
110
111 @Override
Sarah Chin71462482022-11-18 02:25:25 -0800112 public void sendBroadcast(Intent intent) {
113 mIntent = intent;
114 }
115
116 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -0800117 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter) {
Sarah Chin71462482022-11-18 02:25:25 -0800118 mReceiver = receiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800119 return null;
120 }
121
122 @Override
123 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter, int flags) {
Sarah Chin71462482022-11-18 02:25:25 -0800124 mReceiver = receiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800125 return null;
126 }
127
128 @Override
129 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter,
130 String broadcastPermission, Handler scheduler) {
Sarah Chin71462482022-11-18 02:25:25 -0800131 mReceiver = receiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800132 return null;
133 }
134
135 @Override
136 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter,
137 String broadcastPermission, Handler scheduler, int flags) {
Sarah Chin71462482022-11-18 02:25:25 -0800138 mReceiver = receiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800139 return null;
140 }
141
142 @Override
Sarah Chin71462482022-11-18 02:25:25 -0800143 public void unregisterReceiver(BroadcastReceiver receiver) {
144 mReceiver = null;
145 }
146
147 @Override
James.cf Lincdad3862020-02-25 15:55:03 +0800148 public ContentResolver getContentResolver() {
149 return null;
150 }
151
152 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -0800153 public Object getSystemService(String name) {
154 switch (name) {
Sarah Chin71462482022-11-18 02:25:25 -0800155 case Context.CARRIER_CONFIG_SERVICE: {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800156 return mMockCarrierConfigManager;
157 }
Sarah Chin71462482022-11-18 02:25:25 -0800158 case Context.TELECOM_SERVICE: {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800159 return mMockTelecomManager;
160 }
Sarah Chin71462482022-11-18 02:25:25 -0800161 case Context.TELEPHONY_SERVICE: {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800162 return mMockTelephonyManager;
163 }
Sarah Chin71462482022-11-18 02:25:25 -0800164 case Context.TELEPHONY_SUBSCRIPTION_SERVICE: {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800165 return mMockSubscriptionManager;
166 }
Sarah Chin71462482022-11-18 02:25:25 -0800167 case Context.TELEPHONY_IMS_SERVICE: {
James.cf Lincdad3862020-02-25 15:55:03 +0800168 return mMockImsManager;
169 }
Sarah Chin71462482022-11-18 02:25:25 -0800170 case Context.USER_SERVICE: {
Gil Cukierman6dac5eb2022-09-19 16:09:04 +0000171 return mMockUserManager;
172 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800173 }
174 return null;
175 }
176
177 @Override
178 public String getSystemServiceName(Class<?> serviceClass) {
179 if (serviceClass == CarrierConfigManager.class) {
180 return Context.CARRIER_CONFIG_SERVICE;
181 }
182 if (serviceClass == TelecomManager.class) {
183 return Context.TELECOM_SERVICE;
184 }
185 if (serviceClass == TelephonyManager.class) {
186 return Context.TELEPHONY_SERVICE;
187 }
188 if (serviceClass == SubscriptionManager.class) {
189 return Context.TELEPHONY_SUBSCRIPTION_SERVICE;
190 }
Sarah Chin71462482022-11-18 02:25:25 -0800191 if (serviceClass == ImsManager.class) {
192 return Context.TELEPHONY_IMS_SERVICE;
193 }
Gil Cukierman6dac5eb2022-09-19 16:09:04 +0000194 if (serviceClass == UserManager.class) {
195 return Context.USER_SERVICE;
196 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800197 return null;
198 }
199
Hall Liu12feea22021-03-22 15:37:41 -0700200 @Override
201 public Handler getMainThreadHandler() {
202 return new Handler(Looper.getMainLooper());
203 }
204
Brad Ebinger9c5578a2020-09-23 17:03:48 -0700205 /**
206 * @return CarrierConfig PersistableBundle for the subscription specified.
207 */
208 public PersistableBundle getCarrierConfig(int subId) {
209 PersistableBundle b = mCarrierConfigs.get(subId);
210 if (b == null) {
211 b = new PersistableBundle();
212 mCarrierConfigs.put(subId, b);
213 }
214 return b;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800215 }
Rambo Wang7e3bc122021-03-23 09:24:38 -0700216
217 @Override
218 public void enforceCallingOrSelfPermission(String permission, String message) {
219 if (checkCallingOrSelfPermission(permission) != PackageManager.PERMISSION_GRANTED) {
220 throw new SecurityException(permission + " denied: " + message);
221 }
222 }
223
224 @Override
225 public void enforcePermission(String permission, int pid, int uid, String message) {
226 enforceCallingOrSelfPermission(permission, message);
227 }
228
229 @Override
230 public void enforceCallingPermission(String permission, String message) {
231 enforceCallingOrSelfPermission(permission, message);
232 }
233
234 @Override
235 public int checkCallingOrSelfPermission(String permission) {
236 return checkPermission(permission, Binder.getCallingPid(), Binder.getCallingUid());
237 }
238
239 @Override
240 public int checkPermission(String permission, int pid, int uid) {
241 synchronized (mPermissionTable) {
242 if (mPermissionTable.contains(permission)
243 || mPermissionTable.contains(STUB_PERMISSION_ENABLE_ALL)) {
244 logd("checkCallingOrSelfPermission: " + permission + " return GRANTED");
245 return PackageManager.PERMISSION_GRANTED;
246 } else {
247 logd("checkCallingOrSelfPermission: " + permission + " return DENIED");
248 return PackageManager.PERMISSION_DENIED;
249 }
250 }
251 }
252
253 public void grantPermission(String permission) {
254 synchronized (mPermissionTable) {
255 if (mPermissionTable != null && permission != null) {
256 mPermissionTable.remove(STUB_PERMISSION_ENABLE_ALL);
257 mPermissionTable.add(permission);
258 }
259 }
260 }
261
262 public void revokePermission(String permission) {
263 synchronized (mPermissionTable) {
264 if (mPermissionTable != null && permission != null) {
265 mPermissionTable.remove(permission);
266 }
267 }
268 }
269
270 public void revokeAllPermissions() {
271 synchronized (mPermissionTable) {
272 mPermissionTable.clear();
273 }
274 }
275
Sarah Chin71462482022-11-18 02:25:25 -0800276 public Intent getBroadcast() {
277 return mIntent;
278 }
279
280 public BroadcastReceiver getBroadcastReceiver() {
281 return mReceiver;
282 }
283
Rambo Wang7e3bc122021-03-23 09:24:38 -0700284 private static void logd(String s) {
285 Log.d(TAG, s);
286 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800287}