blob: fc5ee4c9c9887be3140497fadf2d578e9fbf7e19 [file] [log] [blame]
Brad Ebingerdc555b42019-12-09 16:12:57 -08001/*
2 * Copyright (C) 2019 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android;
18
19import static org.mockito.ArgumentMatchers.anyInt;
Brad Ebingerb989c7c2020-09-23 17:03:48 -070020import static org.mockito.Mockito.doAnswer;
Brad Ebingerdc555b42019-12-09 16:12:57 -080021
22import android.content.BroadcastReceiver;
James.cf Lincdad3862020-02-25 15:55:03 +080023import android.content.ContentResolver;
Brad Ebingerdc555b42019-12-09 16:12:57 -080024import android.content.Context;
25import android.content.Intent;
26import android.content.IntentFilter;
Rambo Wang7e3bc122021-03-23 09:24:38 -070027import android.content.pm.PackageManager;
28import android.os.Binder;
Brad Ebingerdc555b42019-12-09 16:12:57 -080029import android.os.Handler;
30import android.os.PersistableBundle;
31import android.telecom.TelecomManager;
32import android.telephony.CarrierConfigManager;
33import android.telephony.SubscriptionManager;
34import android.telephony.TelephonyManager;
James.cf Lincdad3862020-02-25 15:55:03 +080035import android.telephony.ims.ImsManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080036import android.test.mock.MockContext;
Rambo Wang7e3bc122021-03-23 09:24:38 -070037import android.util.Log;
Brad Ebingerb989c7c2020-09-23 17:03:48 -070038import android.util.SparseArray;
Brad Ebingerdc555b42019-12-09 16:12:57 -080039
40import org.mockito.Mock;
41import org.mockito.MockitoAnnotations;
Brad Ebingerb989c7c2020-09-23 17:03:48 -070042import org.mockito.stubbing.Answer;
Brad Ebingerdc555b42019-12-09 16:12:57 -080043
Rambo Wang7e3bc122021-03-23 09:24:38 -070044import java.util.HashSet;
Brad Ebingera68a4972020-01-30 17:31:23 -080045import java.util.concurrent.Executor;
46
Brad Ebingerdc555b42019-12-09 16:12:57 -080047public class TestContext extends MockContext {
48
Rambo Wang7e3bc122021-03-23 09:24:38 -070049 private static final String TAG = "TestContext";
50 // Stub used to grant all permissions
51 public static final String STUB_PERMISSION_ENABLE_ALL = "stub_permission_enable_all";
52
Brad Ebingerdc555b42019-12-09 16:12:57 -080053 @Mock CarrierConfigManager mMockCarrierConfigManager;
54 @Mock TelecomManager mMockTelecomManager;
55 @Mock TelephonyManager mMockTelephonyManager;
56 @Mock SubscriptionManager mMockSubscriptionManager;
James.cf Lincdad3862020-02-25 15:55:03 +080057 @Mock ImsManager mMockImsManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080058
Brad Ebingerb989c7c2020-09-23 17:03:48 -070059 private SparseArray<PersistableBundle> mCarrierConfigs = new SparseArray<>();
Brad Ebingerdc555b42019-12-09 16:12:57 -080060
Rambo Wang7e3bc122021-03-23 09:24:38 -070061 private final HashSet<String> mPermissionTable = new HashSet<>();
62
Brad Ebingerdc555b42019-12-09 16:12:57 -080063 public TestContext() {
64 MockitoAnnotations.initMocks(this);
Brad Ebingerb989c7c2020-09-23 17:03:48 -070065 doAnswer((Answer<PersistableBundle>) invocation -> {
66 int subId = (int) invocation.getArguments()[0];
67 if (subId < 0) {
68 return new PersistableBundle();
69 }
70 PersistableBundle b = mCarrierConfigs.get(subId);
71
72 return (b != null ? b : new PersistableBundle());
73 }).when(mMockCarrierConfigManager).getConfigForSubId(anyInt());
Brad Ebingerdc555b42019-12-09 16:12:57 -080074 }
75
76 @Override
Brad Ebingera68a4972020-01-30 17:31:23 -080077 public Executor getMainExecutor() {
78 // Just run on current thread
79 return Runnable::run;
80 }
81
82 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -080083 public Context getApplicationContext() {
84 return this;
85 }
86
87 @Override
88 public String getPackageName() {
89 return "com.android.phone.tests";
90 }
91
92 @Override
Philip P. Moltmann8d34f0c2020-03-05 16:24:02 -080093 public String getAttributionTag() {
Brad Ebingerdc555b42019-12-09 16:12:57 -080094 return "";
95 }
96
97 @Override
98 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter) {
99 return null;
100 }
101
102 @Override
103 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter, int flags) {
104 return null;
105 }
106
107 @Override
108 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter,
109 String broadcastPermission, Handler scheduler) {
110 return null;
111 }
112
113 @Override
114 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter,
115 String broadcastPermission, Handler scheduler, int flags) {
116 return null;
117 }
118
119 @Override
James.cf Lincdad3862020-02-25 15:55:03 +0800120 public ContentResolver getContentResolver() {
121 return null;
122 }
123
124 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -0800125 public Object getSystemService(String name) {
126 switch (name) {
127 case (Context.CARRIER_CONFIG_SERVICE) : {
128 return mMockCarrierConfigManager;
129 }
130 case (Context.TELECOM_SERVICE) : {
131 return mMockTelecomManager;
132 }
133 case (Context.TELEPHONY_SERVICE) : {
134 return mMockTelephonyManager;
135 }
136 case (Context.TELEPHONY_SUBSCRIPTION_SERVICE) : {
137 return mMockSubscriptionManager;
138 }
James.cf Lincdad3862020-02-25 15:55:03 +0800139 case(Context.TELEPHONY_IMS_SERVICE) : {
140 return mMockImsManager;
141 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800142 }
143 return null;
144 }
145
146 @Override
147 public String getSystemServiceName(Class<?> serviceClass) {
148 if (serviceClass == CarrierConfigManager.class) {
149 return Context.CARRIER_CONFIG_SERVICE;
150 }
151 if (serviceClass == TelecomManager.class) {
152 return Context.TELECOM_SERVICE;
153 }
154 if (serviceClass == TelephonyManager.class) {
155 return Context.TELEPHONY_SERVICE;
156 }
157 if (serviceClass == SubscriptionManager.class) {
158 return Context.TELEPHONY_SUBSCRIPTION_SERVICE;
159 }
160 return null;
161 }
162
Brad Ebingerb989c7c2020-09-23 17:03:48 -0700163 /**
164 * @return CarrierConfig PersistableBundle for the subscription specified.
165 */
166 public PersistableBundle getCarrierConfig(int subId) {
167 PersistableBundle b = mCarrierConfigs.get(subId);
168 if (b == null) {
169 b = new PersistableBundle();
170 mCarrierConfigs.put(subId, b);
171 }
172 return b;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800173 }
Rambo Wang7e3bc122021-03-23 09:24:38 -0700174
175 @Override
176 public void enforceCallingOrSelfPermission(String permission, String message) {
177 if (checkCallingOrSelfPermission(permission) != PackageManager.PERMISSION_GRANTED) {
178 throw new SecurityException(permission + " denied: " + message);
179 }
180 }
181
182 @Override
183 public void enforcePermission(String permission, int pid, int uid, String message) {
184 enforceCallingOrSelfPermission(permission, message);
185 }
186
187 @Override
188 public void enforceCallingPermission(String permission, String message) {
189 enforceCallingOrSelfPermission(permission, message);
190 }
191
192 @Override
193 public int checkCallingOrSelfPermission(String permission) {
194 return checkPermission(permission, Binder.getCallingPid(), Binder.getCallingUid());
195 }
196
197 @Override
198 public int checkPermission(String permission, int pid, int uid) {
199 synchronized (mPermissionTable) {
200 if (mPermissionTable.contains(permission)
201 || mPermissionTable.contains(STUB_PERMISSION_ENABLE_ALL)) {
202 logd("checkCallingOrSelfPermission: " + permission + " return GRANTED");
203 return PackageManager.PERMISSION_GRANTED;
204 } else {
205 logd("checkCallingOrSelfPermission: " + permission + " return DENIED");
206 return PackageManager.PERMISSION_DENIED;
207 }
208 }
209 }
210
211 public void grantPermission(String permission) {
212 synchronized (mPermissionTable) {
213 if (mPermissionTable != null && permission != null) {
214 mPermissionTable.remove(STUB_PERMISSION_ENABLE_ALL);
215 mPermissionTable.add(permission);
216 }
217 }
218 }
219
220 public void revokePermission(String permission) {
221 synchronized (mPermissionTable) {
222 if (mPermissionTable != null && permission != null) {
223 mPermissionTable.remove(permission);
224 }
225 }
226 }
227
228 public void revokeAllPermissions() {
229 synchronized (mPermissionTable) {
230 mPermissionTable.clear();
231 }
232 }
233
234 private static void logd(String s) {
235 Log.d(TAG, s);
236 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800237}