Also make the new lib only use system-apis. This allows mainline module to use the new RestrictedLockUtilsSettingLib. Unfortunately the whole RestrictedLockUtils would have caused to much new system-api. Hence it was split into RestrictedLockUtils and RestrictedLockUtilsInternal. This caused a lot of trivial code changes. Bug: 110953302 Test: Built Change-Id: I693b3bf56f3be71f0790776e3aad5694717786ef
68 lines
2.8 KiB
Java
68 lines
2.8 KiB
Java
/*
|
|
* Copyright (C) 2015 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
package com.android.settingslib;
|
|
|
|
import static android.os.UserManager.DISALLOW_CONFIG_TETHERING;
|
|
|
|
import android.content.Context;
|
|
import android.net.ConnectivityManager;
|
|
import android.os.SystemProperties;
|
|
import android.os.UserHandle;
|
|
import android.telephony.CarrierConfigManager;
|
|
|
|
import androidx.annotation.VisibleForTesting;
|
|
|
|
public class TetherUtil {
|
|
|
|
@VisibleForTesting
|
|
static boolean isEntitlementCheckRequired(Context context) {
|
|
final CarrierConfigManager configManager = (CarrierConfigManager) context
|
|
.getSystemService(Context.CARRIER_CONFIG_SERVICE);
|
|
if (configManager == null || configManager.getConfig() == null) {
|
|
// return service default
|
|
return true;
|
|
}
|
|
return configManager.getConfig().getBoolean(CarrierConfigManager
|
|
.KEY_REQUIRE_ENTITLEMENT_CHECKS_BOOL);
|
|
}
|
|
|
|
public static boolean isProvisioningNeeded(Context context) {
|
|
// Keep in sync with other usage of config_mobile_hotspot_provision_app.
|
|
// ConnectivityManager#enforceTetherChangePermission
|
|
String[] provisionApp = context.getResources().getStringArray(
|
|
com.android.internal.R.array.config_mobile_hotspot_provision_app);
|
|
if (SystemProperties.getBoolean("net.tethering.noprovisioning", false)
|
|
|| provisionApp == null) {
|
|
return false;
|
|
}
|
|
// Check carrier config for entitlement checks
|
|
if (isEntitlementCheckRequired(context) == false) {
|
|
return false;
|
|
}
|
|
return (provisionApp.length == 2);
|
|
}
|
|
|
|
public static boolean isTetherAvailable(Context context) {
|
|
final ConnectivityManager cm = context.getSystemService(ConnectivityManager.class);
|
|
final boolean tetherConfigDisallowed = RestrictedLockUtilsInternal
|
|
.checkIfRestrictionEnforced(context, DISALLOW_CONFIG_TETHERING,
|
|
UserHandle.myUserId()) != null;
|
|
final boolean hasBaseUserRestriction = RestrictedLockUtilsInternal.hasBaseUserRestriction(
|
|
context, DISALLOW_CONFIG_TETHERING, UserHandle.myUserId());
|
|
return (cm.isTetheringSupported() || tetherConfigDisallowed) && !hasBaseUserRestriction;
|
|
}
|
|
}
|