blob: 2b35473057724482bbdac710e56ed605e2e68114 [file] [log] [blame]
Brad Ebingerdc555b42019-12-09 16:12:57 -08001/*
2 * Copyright (C) 2019 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android;
18
19import static org.mockito.ArgumentMatchers.anyInt;
Brad Ebinger6c53e7f2023-01-27 16:26:44 -080020import static org.mockito.ArgumentMatchers.anyString;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070021import static org.mockito.Mockito.doAnswer;
Tomasz Wasilczykd78e8702024-03-14 11:11:46 -070022import static org.mockito.Mockito.when;
Brad Ebingerdc555b42019-12-09 16:12:57 -080023
Rafael Higuera Silva0b1ccf62022-02-11 17:58:27 +000024import android.content.AttributionSource;
Brad Ebingerdc555b42019-12-09 16:12:57 -080025import android.content.BroadcastReceiver;
James.cf Lincdad3862020-02-25 15:55:03 +080026import android.content.ContentResolver;
Brad Ebingerdc555b42019-12-09 16:12:57 -080027import android.content.Context;
28import android.content.Intent;
29import android.content.IntentFilter;
Tyler Gunnb1ead4b2024-11-15 17:27:21 +000030import android.content.ServiceConnection;
Rambo Wang7e3bc122021-03-23 09:24:38 -070031import android.content.pm.PackageManager;
32import android.os.Binder;
Brad Ebingerdc555b42019-12-09 16:12:57 -080033import android.os.Handler;
Hall Liu12feea22021-03-22 15:37:41 -070034import android.os.Looper;
Brad Ebingerdc555b42019-12-09 16:12:57 -080035import android.os.PersistableBundle;
Rafael Higuera Silva0b1ccf62022-02-11 17:58:27 +000036import android.os.Process;
Jack Yu58d04bd2024-09-10 17:32:39 -070037import android.os.UserHandle;
Gil Cukierman6dac5eb2022-09-19 16:09:04 +000038import android.os.UserManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080039import android.telecom.TelecomManager;
40import android.telephony.CarrierConfigManager;
41import android.telephony.SubscriptionManager;
42import android.telephony.TelephonyManager;
James.cf Lincdad3862020-02-25 15:55:03 +080043import android.telephony.ims.ImsManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080044import android.test.mock.MockContext;
Rambo Wang7e3bc122021-03-23 09:24:38 -070045import android.util.Log;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070046import android.util.SparseArray;
Brad Ebingerdc555b42019-12-09 16:12:57 -080047
48import org.mockito.Mock;
49import org.mockito.MockitoAnnotations;
Brad Ebinger9c5578a2020-09-23 17:03:48 -070050import org.mockito.stubbing.Answer;
Brad Ebingerdc555b42019-12-09 16:12:57 -080051
Rambo Wang7e3bc122021-03-23 09:24:38 -070052import java.util.HashSet;
Brad Ebingera68a4972020-01-30 17:31:23 -080053import java.util.concurrent.Executor;
54
Brad Ebingerdc555b42019-12-09 16:12:57 -080055public class TestContext extends MockContext {
56
Rambo Wang7e3bc122021-03-23 09:24:38 -070057 private static final String TAG = "TestContext";
58 // Stub used to grant all permissions
59 public static final String STUB_PERMISSION_ENABLE_ALL = "stub_permission_enable_all";
60
Brad Ebingerdc555b42019-12-09 16:12:57 -080061 @Mock CarrierConfigManager mMockCarrierConfigManager;
62 @Mock TelecomManager mMockTelecomManager;
63 @Mock TelephonyManager mMockTelephonyManager;
64 @Mock SubscriptionManager mMockSubscriptionManager;
James.cf Lincdad3862020-02-25 15:55:03 +080065 @Mock ImsManager mMockImsManager;
Gil Cukierman6dac5eb2022-09-19 16:09:04 +000066 @Mock UserManager mMockUserManager;
Tomasz Wasilczykd78e8702024-03-14 11:11:46 -070067 @Mock PackageManager mPackageManager;
Brad Ebingerdc555b42019-12-09 16:12:57 -080068
Sarah Chin71462482022-11-18 02:25:25 -080069 private final SparseArray<PersistableBundle> mCarrierConfigs = new SparseArray<>();
70
71 private Intent mIntent;
72
73 private BroadcastReceiver mReceiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -080074
Rambo Wang7e3bc122021-03-23 09:24:38 -070075 private final HashSet<String> mPermissionTable = new HashSet<>();
76
Brad Ebingerdc555b42019-12-09 16:12:57 -080077 public TestContext() {
78 MockitoAnnotations.initMocks(this);
Brad Ebinger9c5578a2020-09-23 17:03:48 -070079 doAnswer((Answer<PersistableBundle>) invocation -> {
80 int subId = (int) invocation.getArguments()[0];
Brad Ebinger6c53e7f2023-01-27 16:26:44 -080081 return getTestConfigs(subId);
Brad Ebinger9c5578a2020-09-23 17:03:48 -070082 }).when(mMockCarrierConfigManager).getConfigForSubId(anyInt());
Brad Ebinger6c53e7f2023-01-27 16:26:44 -080083 doAnswer((Answer<PersistableBundle>) invocation -> {
84 int subId = (int) invocation.getArguments()[0];
85 return getTestConfigs(subId);
86 }).when(mMockCarrierConfigManager).getConfigForSubId(anyInt(), anyString());
Tomasz Wasilczykd78e8702024-03-14 11:11:46 -070087 when(mPackageManager.hasSystemFeature(anyString())).thenReturn(true);
Brad Ebingerdc555b42019-12-09 16:12:57 -080088 }
89
90 @Override
Brad Ebingera68a4972020-01-30 17:31:23 -080091 public Executor getMainExecutor() {
92 // Just run on current thread
93 return Runnable::run;
94 }
95
96 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -080097 public Context getApplicationContext() {
98 return this;
99 }
100
101 @Override
102 public String getPackageName() {
103 return "com.android.phone.tests";
104 }
105
106 @Override
Tomasz Wasilczyk33c44522024-11-07 21:18:16 -0800107 public String getOpPackageName() {
108 return getPackageName();
109 }
110
111 @Override
Philip P. Moltmann8d34f0c2020-03-05 16:24:02 -0800112 public String getAttributionTag() {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800113 return "";
114 }
115
116 @Override
Rafael Higuera Silva0b1ccf62022-02-11 17:58:27 +0000117 public AttributionSource getAttributionSource() {
118 return new AttributionSource(Process.myUid(), getPackageName(), "");
119 }
120
121 @Override
Jack Yu58d04bd2024-09-10 17:32:39 -0700122 public void startActivityAsUser(Intent intent, UserHandle user) {
123 throw new UnsupportedOperationException();
124 }
125
126 @Override
Sarah Chin71462482022-11-18 02:25:25 -0800127 public void sendBroadcast(Intent intent) {
128 mIntent = intent;
129 }
130
131 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -0800132 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter) {
Sarah Chin71462482022-11-18 02:25:25 -0800133 mReceiver = receiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800134 return null;
135 }
136
137 @Override
138 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter, int flags) {
Sarah Chin71462482022-11-18 02:25:25 -0800139 mReceiver = receiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800140 return null;
141 }
142
143 @Override
144 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter,
145 String broadcastPermission, Handler scheduler) {
Sarah Chin71462482022-11-18 02:25:25 -0800146 mReceiver = receiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800147 return null;
148 }
149
150 @Override
151 public Intent registerReceiver(BroadcastReceiver receiver, IntentFilter filter,
152 String broadcastPermission, Handler scheduler, int flags) {
Sarah Chin71462482022-11-18 02:25:25 -0800153 mReceiver = receiver;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800154 return null;
155 }
156
157 @Override
Sarah Chin71462482022-11-18 02:25:25 -0800158 public void unregisterReceiver(BroadcastReceiver receiver) {
159 mReceiver = null;
160 }
161
162 @Override
Tomasz Wasilczykd78e8702024-03-14 11:11:46 -0700163 public PackageManager getPackageManager() {
164 return mPackageManager;
165 }
166
167 @Override
James.cf Lincdad3862020-02-25 15:55:03 +0800168 public ContentResolver getContentResolver() {
169 return null;
170 }
171
172 @Override
Brad Ebingerdc555b42019-12-09 16:12:57 -0800173 public Object getSystemService(String name) {
174 switch (name) {
Sarah Chin71462482022-11-18 02:25:25 -0800175 case Context.CARRIER_CONFIG_SERVICE: {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800176 return mMockCarrierConfigManager;
177 }
Sarah Chin71462482022-11-18 02:25:25 -0800178 case Context.TELECOM_SERVICE: {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800179 return mMockTelecomManager;
180 }
Sarah Chin71462482022-11-18 02:25:25 -0800181 case Context.TELEPHONY_SERVICE: {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800182 return mMockTelephonyManager;
183 }
Sarah Chin71462482022-11-18 02:25:25 -0800184 case Context.TELEPHONY_SUBSCRIPTION_SERVICE: {
Brad Ebingerdc555b42019-12-09 16:12:57 -0800185 return mMockSubscriptionManager;
186 }
Sarah Chin71462482022-11-18 02:25:25 -0800187 case Context.TELEPHONY_IMS_SERVICE: {
James.cf Lincdad3862020-02-25 15:55:03 +0800188 return mMockImsManager;
189 }
Sarah Chin71462482022-11-18 02:25:25 -0800190 case Context.USER_SERVICE: {
Gil Cukierman6dac5eb2022-09-19 16:09:04 +0000191 return mMockUserManager;
192 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800193 }
194 return null;
195 }
196
197 @Override
198 public String getSystemServiceName(Class<?> serviceClass) {
199 if (serviceClass == CarrierConfigManager.class) {
200 return Context.CARRIER_CONFIG_SERVICE;
201 }
202 if (serviceClass == TelecomManager.class) {
203 return Context.TELECOM_SERVICE;
204 }
205 if (serviceClass == TelephonyManager.class) {
206 return Context.TELEPHONY_SERVICE;
207 }
208 if (serviceClass == SubscriptionManager.class) {
209 return Context.TELEPHONY_SUBSCRIPTION_SERVICE;
210 }
Sarah Chin71462482022-11-18 02:25:25 -0800211 if (serviceClass == ImsManager.class) {
212 return Context.TELEPHONY_IMS_SERVICE;
213 }
Gil Cukierman6dac5eb2022-09-19 16:09:04 +0000214 if (serviceClass == UserManager.class) {
215 return Context.USER_SERVICE;
216 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800217 return null;
218 }
219
Hall Liu12feea22021-03-22 15:37:41 -0700220 @Override
Tomasz Wasilczyk310544d2024-10-24 14:08:18 -0700221 public Looper getMainLooper() {
222 return Looper.getMainLooper();
223 }
224
225 @Override
Hall Liu12feea22021-03-22 15:37:41 -0700226 public Handler getMainThreadHandler() {
227 return new Handler(Looper.getMainLooper());
228 }
229
Brad Ebinger9c5578a2020-09-23 17:03:48 -0700230 /**
231 * @return CarrierConfig PersistableBundle for the subscription specified.
232 */
233 public PersistableBundle getCarrierConfig(int subId) {
234 PersistableBundle b = mCarrierConfigs.get(subId);
235 if (b == null) {
236 b = new PersistableBundle();
237 mCarrierConfigs.put(subId, b);
238 }
239 return b;
Brad Ebingerdc555b42019-12-09 16:12:57 -0800240 }
Rambo Wang7e3bc122021-03-23 09:24:38 -0700241
242 @Override
243 public void enforceCallingOrSelfPermission(String permission, String message) {
244 if (checkCallingOrSelfPermission(permission) != PackageManager.PERMISSION_GRANTED) {
245 throw new SecurityException(permission + " denied: " + message);
246 }
247 }
248
249 @Override
250 public void enforcePermission(String permission, int pid, int uid, String message) {
251 enforceCallingOrSelfPermission(permission, message);
252 }
253
254 @Override
255 public void enforceCallingPermission(String permission, String message) {
256 enforceCallingOrSelfPermission(permission, message);
257 }
258
259 @Override
260 public int checkCallingOrSelfPermission(String permission) {
261 return checkPermission(permission, Binder.getCallingPid(), Binder.getCallingUid());
262 }
263
264 @Override
265 public int checkPermission(String permission, int pid, int uid) {
266 synchronized (mPermissionTable) {
267 if (mPermissionTable.contains(permission)
268 || mPermissionTable.contains(STUB_PERMISSION_ENABLE_ALL)) {
269 logd("checkCallingOrSelfPermission: " + permission + " return GRANTED");
270 return PackageManager.PERMISSION_GRANTED;
271 } else {
272 logd("checkCallingOrSelfPermission: " + permission + " return DENIED");
273 return PackageManager.PERMISSION_DENIED;
274 }
275 }
276 }
277
Tyler Gunnb1ead4b2024-11-15 17:27:21 +0000278 @Override
279 public void unbindService(ServiceConnection conn) {
280 // Override the base implementation to ensure we don't crash.
281 }
282
Rambo Wang7e3bc122021-03-23 09:24:38 -0700283 public void grantPermission(String permission) {
284 synchronized (mPermissionTable) {
Brad Ebinger6c53e7f2023-01-27 16:26:44 -0800285 if (permission == null) return;
286 mPermissionTable.remove(STUB_PERMISSION_ENABLE_ALL);
287 mPermissionTable.add(permission);
Rambo Wang7e3bc122021-03-23 09:24:38 -0700288 }
289 }
290
291 public void revokePermission(String permission) {
292 synchronized (mPermissionTable) {
Brad Ebinger6c53e7f2023-01-27 16:26:44 -0800293 if (permission == null) return;
294 mPermissionTable.remove(permission);
Rambo Wang7e3bc122021-03-23 09:24:38 -0700295 }
296 }
297
298 public void revokeAllPermissions() {
299 synchronized (mPermissionTable) {
300 mPermissionTable.clear();
301 }
302 }
303
Sarah Chin71462482022-11-18 02:25:25 -0800304 public Intent getBroadcast() {
305 return mIntent;
306 }
307
308 public BroadcastReceiver getBroadcastReceiver() {
309 return mReceiver;
310 }
311
Brad Ebinger6c53e7f2023-01-27 16:26:44 -0800312 private PersistableBundle getTestConfigs(int subId) {
313 if (subId < 0) {
314 return new PersistableBundle();
315 }
316 PersistableBundle b = getCarrierConfig(subId);
317 return (b != null ? b : new PersistableBundle());
318 }
319
Rambo Wang7e3bc122021-03-23 09:24:38 -0700320 private static void logd(String s) {
321 Log.d(TAG, s);
322 }
Brad Ebingerdc555b42019-12-09 16:12:57 -0800323}