1/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package android.net;
18
19import static android.system.OsConstants.AF_INET;
20import static android.system.OsConstants.AF_INET6;
21
22import android.annotation.SystemApi;
23import android.app.Activity;
24import android.app.PendingIntent;
25import android.app.Service;
26import android.content.Context;
27import android.content.Intent;
28import android.content.pm.IPackageManager;
29import android.content.pm.PackageManager;
30import android.net.Network;
31import android.net.NetworkUtils;
32import android.os.Binder;
33import android.os.IBinder;
34import android.os.Parcel;
35import android.os.ParcelFileDescriptor;
36import android.os.RemoteException;
37import android.os.ServiceManager;
38import android.os.UserHandle;
39
40import com.android.internal.net.VpnConfig;
41
42import java.net.DatagramSocket;
43import java.net.Inet4Address;
44import java.net.Inet6Address;
45import java.net.InetAddress;
46import java.net.Socket;
47import java.util.ArrayList;
48import java.util.List;
49
50/**
51 * VpnService is a base class for applications to extend and build their
52 * own VPN solutions. In general, it creates a virtual network interface,
53 * configures addresses and routing rules, and returns a file descriptor
54 * to the application. Each read from the descriptor retrieves an outgoing
55 * packet which was routed to the interface. Each write to the descriptor
56 * injects an incoming packet just like it was received from the interface.
57 * The interface is running on Internet Protocol (IP), so packets are
58 * always started with IP headers. The application then completes a VPN
59 * connection by processing and exchanging packets with the remote server
60 * over a tunnel.
61 *
62 * <p>Letting applications intercept packets raises huge security concerns.
63 * A VPN application can easily break the network. Besides, two of them may
64 * conflict with each other. The system takes several actions to address
65 * these issues. Here are some key points:
66 * <ul>
67 *   <li>User action is required the first time an application creates a VPN
68 *       connection.</li>
69 *   <li>There can be only one VPN connection running at the same time. The
70 *       existing interface is deactivated when a new one is created.</li>
71 *   <li>A system-managed notification is shown during the lifetime of a
72 *       VPN connection.</li>
73 *   <li>A system-managed dialog gives the information of the current VPN
74 *       connection. It also provides a button to disconnect.</li>
75 *   <li>The network is restored automatically when the file descriptor is
76 *       closed. It also covers the cases when a VPN application is crashed
77 *       or killed by the system.</li>
78 * </ul>
79 *
80 * <p>There are two primary methods in this class: {@link #prepare} and
81 * {@link Builder#establish}. The former deals with user action and stops
82 * the VPN connection created by another application. The latter creates
83 * a VPN interface using the parameters supplied to the {@link Builder}.
84 * An application must call {@link #prepare} to grant the right to use
85 * other methods in this class, and the right can be revoked at any time.
86 * Here are the general steps to create a VPN connection:
87 * <ol>
88 *   <li>When the user presses the button to connect, call {@link #prepare}
89 *       and launch the returned intent, if non-null.</li>
90 *   <li>When the application becomes prepared, start the service.</li>
91 *   <li>Create a tunnel to the remote server and negotiate the network
92 *       parameters for the VPN connection.</li>
93 *   <li>Supply those parameters to a {@link Builder} and create a VPN
94 *       interface by calling {@link Builder#establish}.</li>
95 *   <li>Process and exchange packets between the tunnel and the returned
96 *       file descriptor.</li>
97 *   <li>When {@link #onRevoke} is invoked, close the file descriptor and
98 *       shut down the tunnel gracefully.</li>
99 * </ol>
100 *
101 * <p>Services extended this class need to be declared with appropriate
102 * permission and intent filter. Their access must be secured by
103 * {@link android.Manifest.permission#BIND_VPN_SERVICE} permission, and
104 * their intent filter must match {@link #SERVICE_INTERFACE} action. Here
105 * is an example of declaring a VPN service in {@code AndroidManifest.xml}:
106 * <pre>
107 * &lt;service android:name=".ExampleVpnService"
108 *         android:permission="android.permission.BIND_VPN_SERVICE"&gt;
109 *     &lt;intent-filter&gt;
110 *         &lt;action android:name="android.net.VpnService"/&gt;
111 *     &lt;/intent-filter&gt;
112 * &lt;/service&gt;</pre>
113 *
114 * @see Builder
115 */
116public class VpnService extends Service {
117
118    /**
119     * The action must be matched by the intent filter of this service. It also
120     * needs to require {@link android.Manifest.permission#BIND_VPN_SERVICE}
121     * permission so that other applications cannot abuse it.
122     */
123    public static final String SERVICE_INTERFACE = VpnConfig.SERVICE_INTERFACE;
124
125    /**
126     * Use IConnectivityManager since those methods are hidden and not
127     * available in ConnectivityManager.
128     */
129    private static IConnectivityManager getService() {
130        return IConnectivityManager.Stub.asInterface(
131                ServiceManager.getService(Context.CONNECTIVITY_SERVICE));
132    }
133
134    /**
135     * Prepare to establish a VPN connection. This method returns {@code null}
136     * if the VPN application is already prepared or if the user has previously
137     * consented to the VPN application. Otherwise, it returns an
138     * {@link Intent} to a system activity. The application should launch the
139     * activity using {@link Activity#startActivityForResult} to get itself
140     * prepared. The activity may pop up a dialog to require user action, and
141     * the result will come back via its {@link Activity#onActivityResult}.
142     * If the result is {@link Activity#RESULT_OK}, the application becomes
143     * prepared and is granted to use other methods in this class.
144     *
145     * <p>Only one application can be granted at the same time. The right
146     * is revoked when another application is granted. The application
147     * losing the right will be notified via its {@link #onRevoke}. Unless
148     * it becomes prepared again, subsequent calls to other methods in this
149     * class will fail.
150     *
151     * <p>The user may disable the VPN at any time while it is activated, in
152     * which case this method will return an intent the next time it is
153     * executed to obtain the user's consent again.
154     *
155     * @see #onRevoke
156     */
157    public static Intent prepare(Context context) {
158        try {
159            if (getService().prepareVpn(context.getPackageName(), null, UserHandle.myUserId())) {
160                return null;
161            }
162        } catch (RemoteException e) {
163            // ignore
164        }
165        return VpnConfig.getIntentForConfirmation();
166    }
167
168    /**
169     * Version of {@link #prepare(Context)} which does not require user consent.
170     *
171     * <p>Requires {@link android.Manifest.permission#CONTROL_VPN} and should generally not be
172     * used. Only acceptable in situations where user consent has been obtained through other means.
173     *
174     * <p>Once this is run, future preparations may be done with the standard prepare method as this
175     * will authorize the package to prepare the VPN without consent in the future.
176     *
177     * @hide
178     */
179    @SystemApi
180    public static void prepareAndAuthorize(Context context) {
181        IConnectivityManager cm = getService();
182        String packageName = context.getPackageName();
183        try {
184            // Only prepare if we're not already prepared.
185            int userId = UserHandle.myUserId();
186            if (!cm.prepareVpn(packageName, null, userId)) {
187                cm.prepareVpn(null, packageName, userId);
188            }
189            cm.setVpnPackageAuthorization(packageName, userId, true);
190        } catch (RemoteException e) {
191            // ignore
192        }
193    }
194
195    /**
196     * Protect a socket from VPN connections. After protecting, data sent
197     * through this socket will go directly to the underlying network,
198     * so its traffic will not be forwarded through the VPN.
199     * This method is useful if some connections need to be kept
200     * outside of VPN. For example, a VPN tunnel should protect itself if its
201     * destination is covered by VPN routes. Otherwise its outgoing packets
202     * will be sent back to the VPN interface and cause an infinite loop. This
203     * method will fail if the application is not prepared or is revoked.
204     *
205     * <p class="note">The socket is NOT closed by this method.
206     *
207     * @return {@code true} on success.
208     */
209    public boolean protect(int socket) {
210        return NetworkUtils.protectFromVpn(socket);
211    }
212
213    /**
214     * Convenience method to protect a {@link Socket} from VPN connections.
215     *
216     * @return {@code true} on success.
217     * @see #protect(int)
218     */
219    public boolean protect(Socket socket) {
220        return protect(socket.getFileDescriptor$().getInt$());
221    }
222
223    /**
224     * Convenience method to protect a {@link DatagramSocket} from VPN
225     * connections.
226     *
227     * @return {@code true} on success.
228     * @see #protect(int)
229     */
230    public boolean protect(DatagramSocket socket) {
231        return protect(socket.getFileDescriptor$().getInt$());
232    }
233
234    /**
235     * Adds a network address to the VPN interface.
236     *
237     * Both IPv4 and IPv6 addresses are supported. The VPN must already be established. Fails if the
238     * address is already in use or cannot be assigned to the interface for any other reason.
239     *
240     * Adding an address implicitly allows traffic from that address family (i.e., IPv4 or IPv6) to
241     * be routed over the VPN. @see Builder#allowFamily
242     *
243     * @throws {@link IllegalArgumentException} if the address is invalid.
244     *
245     * @param address The IP address (IPv4 or IPv6) to assign to the VPN interface.
246     * @param prefixLength The prefix length of the address.
247     *
248     * @return {@code true} on success.
249     * @see Builder#addAddress
250     *
251     * @hide
252     */
253    public boolean addAddress(InetAddress address, int prefixLength) {
254        check(address, prefixLength);
255        try {
256            return getService().addVpnAddress(address.getHostAddress(), prefixLength);
257        } catch (RemoteException e) {
258            throw new IllegalStateException(e);
259        }
260    }
261
262    /**
263     * Removes a network address from the VPN interface.
264     *
265     * Both IPv4 and IPv6 addresses are supported. The VPN must already be established. Fails if the
266     * address is not assigned to the VPN interface, or if it is the only address assigned (thus
267     * cannot be removed), or if the address cannot be removed for any other reason.
268     *
269     * After removing an address, if there are no addresses, routes or DNS servers of a particular
270     * address family (i.e., IPv4 or IPv6) configured on the VPN, that <b>DOES NOT</b> block that
271     * family from being routed. In other words, once an address family has been allowed, it stays
272     * allowed for the rest of the VPN's session. @see Builder#allowFamily
273     *
274     * @throws {@link IllegalArgumentException} if the address is invalid.
275     *
276     * @param address The IP address (IPv4 or IPv6) to assign to the VPN interface.
277     * @param prefixLength The prefix length of the address.
278     *
279     * @return {@code true} on success.
280     *
281     * @hide
282     */
283    public boolean removeAddress(InetAddress address, int prefixLength) {
284        check(address, prefixLength);
285        try {
286            return getService().removeVpnAddress(address.getHostAddress(), prefixLength);
287        } catch (RemoteException e) {
288            throw new IllegalStateException(e);
289        }
290    }
291
292    /**
293     * Sets the underlying networks used by the VPN for its upstream connections.
294     *
295     * <p>Used by the system to know the actual networks that carry traffic for apps affected by
296     * this VPN in order to present this information to the user (e.g., via status bar icons).
297     *
298     * <p>This method only needs to be called if the VPN has explicitly bound its underlying
299     * communications channels &mdash; such as the socket(s) passed to {@link #protect(int)} &mdash;
300     * to a {@code Network} using APIs such as {@link Network#bindSocket(Socket)} or
301     * {@link Network#bindSocket(DatagramSocket)}. The VPN should call this method every time
302     * the set of {@code Network}s it is using changes.
303     *
304     * <p>{@code networks} is one of the following:
305     * <ul>
306     * <li><strong>a non-empty array</strong>: an array of one or more {@link Network}s, in
307     * decreasing preference order. For example, if this VPN uses both wifi and mobile (cellular)
308     * networks to carry app traffic, but prefers or uses wifi more than mobile, wifi should appear
309     * first in the array.</li>
310     * <li><strong>an empty array</strong>: a zero-element array, meaning that the VPN has no
311     * underlying network connection, and thus, app traffic will not be sent or received.</li>
312     * <li><strong>null</strong>: (default) signifies that the VPN uses whatever is the system's
313     * default network. I.e., it doesn't use the {@code bindSocket} or {@code bindDatagramSocket}
314     * APIs mentioned above to send traffic over specific channels.</li>
315     * </ul>
316     *
317     * <p>This call will succeed only if the VPN is currently established. For setting this value
318     * when the VPN has not yet been established, see {@link Builder#setUnderlyingNetworks}.
319     *
320     * @param networks An array of networks the VPN uses to tunnel traffic to/from its servers.
321     *
322     * @return {@code true} on success.
323     */
324    public boolean setUnderlyingNetworks(Network[] networks) {
325        try {
326            return getService().setUnderlyingNetworksForVpn(networks);
327        } catch (RemoteException e) {
328            throw new IllegalStateException(e);
329        }
330    }
331
332    /**
333     * Return the communication interface to the service. This method returns
334     * {@code null} on {@link Intent}s other than {@link #SERVICE_INTERFACE}
335     * action. Applications overriding this method must identify the intent
336     * and return the corresponding interface accordingly.
337     *
338     * @see Service#onBind
339     */
340    @Override
341    public IBinder onBind(Intent intent) {
342        if (intent != null && SERVICE_INTERFACE.equals(intent.getAction())) {
343            return new Callback();
344        }
345        return null;
346    }
347
348    /**
349     * Invoked when the application is revoked. At this moment, the VPN
350     * interface is already deactivated by the system. The application should
351     * close the file descriptor and shut down gracefully. The default
352     * implementation of this method is calling {@link Service#stopSelf()}.
353     *
354     * <p class="note">Calls to this method may not happen on the main thread
355     * of the process.
356     *
357     * @see #prepare
358     */
359    public void onRevoke() {
360        stopSelf();
361    }
362
363    /**
364     * Use raw Binder instead of AIDL since now there is only one usage.
365     */
366    private class Callback extends Binder {
367        @Override
368        protected boolean onTransact(int code, Parcel data, Parcel reply, int flags) {
369            if (code == IBinder.LAST_CALL_TRANSACTION) {
370                onRevoke();
371                return true;
372            }
373            return false;
374        }
375    }
376
377    /**
378     * Private method to validate address and prefixLength.
379     */
380    private static void check(InetAddress address, int prefixLength) {
381        if (address.isLoopbackAddress()) {
382            throw new IllegalArgumentException("Bad address");
383        }
384        if (address instanceof Inet4Address) {
385            if (prefixLength < 0 || prefixLength > 32) {
386                throw new IllegalArgumentException("Bad prefixLength");
387            }
388        } else if (address instanceof Inet6Address) {
389            if (prefixLength < 0 || prefixLength > 128) {
390                throw new IllegalArgumentException("Bad prefixLength");
391            }
392        } else {
393            throw new IllegalArgumentException("Unsupported family");
394        }
395    }
396
397    /**
398     * Helper class to create a VPN interface. This class should be always
399     * used within the scope of the outer {@link VpnService}.
400     *
401     * @see VpnService
402     */
403    public class Builder {
404
405        private final VpnConfig mConfig = new VpnConfig();
406        private final List<LinkAddress> mAddresses = new ArrayList<LinkAddress>();
407        private final List<RouteInfo> mRoutes = new ArrayList<RouteInfo>();
408
409        public Builder() {
410            mConfig.user = VpnService.this.getClass().getName();
411        }
412
413        /**
414         * Set the name of this session. It will be displayed in
415         * system-managed dialogs and notifications. This is recommended
416         * not required.
417         */
418        public Builder setSession(String session) {
419            mConfig.session = session;
420            return this;
421        }
422
423        /**
424         * Set the {@link PendingIntent} to an activity for users to
425         * configure the VPN connection. If it is not set, the button
426         * to configure will not be shown in system-managed dialogs.
427         */
428        public Builder setConfigureIntent(PendingIntent intent) {
429            mConfig.configureIntent = intent;
430            return this;
431        }
432
433        /**
434         * Set the maximum transmission unit (MTU) of the VPN interface. If
435         * it is not set, the default value in the operating system will be
436         * used.
437         *
438         * @throws IllegalArgumentException if the value is not positive.
439         */
440        public Builder setMtu(int mtu) {
441            if (mtu <= 0) {
442                throw new IllegalArgumentException("Bad mtu");
443            }
444            mConfig.mtu = mtu;
445            return this;
446        }
447
448        /**
449         * Add a network address to the VPN interface. Both IPv4 and IPv6
450         * addresses are supported. At least one address must be set before
451         * calling {@link #establish}.
452         *
453         * Adding an address implicitly allows traffic from that address family
454         * (i.e., IPv4 or IPv6) to be routed over the VPN. @see #allowFamily
455         *
456         * @throws IllegalArgumentException if the address is invalid.
457         */
458        public Builder addAddress(InetAddress address, int prefixLength) {
459            check(address, prefixLength);
460
461            if (address.isAnyLocalAddress()) {
462                throw new IllegalArgumentException("Bad address");
463            }
464            mAddresses.add(new LinkAddress(address, prefixLength));
465            mConfig.updateAllowedFamilies(address);
466            return this;
467        }
468
469        /**
470         * Convenience method to add a network address to the VPN interface
471         * using a numeric address string. See {@link InetAddress} for the
472         * definitions of numeric address formats.
473         *
474         * Adding an address implicitly allows traffic from that address family
475         * (i.e., IPv4 or IPv6) to be routed over the VPN. @see #allowFamily
476         *
477         * @throws IllegalArgumentException if the address is invalid.
478         * @see #addAddress(InetAddress, int)
479         */
480        public Builder addAddress(String address, int prefixLength) {
481            return addAddress(InetAddress.parseNumericAddress(address), prefixLength);
482        }
483
484        /**
485         * Add a network route to the VPN interface. Both IPv4 and IPv6
486         * routes are supported.
487         *
488         * Adding a route implicitly allows traffic from that address family
489         * (i.e., IPv4 or IPv6) to be routed over the VPN. @see #allowFamily
490         *
491         * @throws IllegalArgumentException if the route is invalid.
492         */
493        public Builder addRoute(InetAddress address, int prefixLength) {
494            check(address, prefixLength);
495
496            int offset = prefixLength / 8;
497            byte[] bytes = address.getAddress();
498            if (offset < bytes.length) {
499                for (bytes[offset] <<= prefixLength % 8; offset < bytes.length; ++offset) {
500                    if (bytes[offset] != 0) {
501                        throw new IllegalArgumentException("Bad address");
502                    }
503                }
504            }
505            mRoutes.add(new RouteInfo(new IpPrefix(address, prefixLength), null));
506            mConfig.updateAllowedFamilies(address);
507            return this;
508        }
509
510        /**
511         * Convenience method to add a network route to the VPN interface
512         * using a numeric address string. See {@link InetAddress} for the
513         * definitions of numeric address formats.
514         *
515         * Adding a route implicitly allows traffic from that address family
516         * (i.e., IPv4 or IPv6) to be routed over the VPN. @see #allowFamily
517         *
518         * @throws IllegalArgumentException if the route is invalid.
519         * @see #addRoute(InetAddress, int)
520         */
521        public Builder addRoute(String address, int prefixLength) {
522            return addRoute(InetAddress.parseNumericAddress(address), prefixLength);
523        }
524
525        /**
526         * Add a DNS server to the VPN connection. Both IPv4 and IPv6
527         * addresses are supported. If none is set, the DNS servers of
528         * the default network will be used.
529         *
530         * Adding a server implicitly allows traffic from that address family
531         * (i.e., IPv4 or IPv6) to be routed over the VPN. @see #allowFamily
532         *
533         * @throws IllegalArgumentException if the address is invalid.
534         */
535        public Builder addDnsServer(InetAddress address) {
536            if (address.isLoopbackAddress() || address.isAnyLocalAddress()) {
537                throw new IllegalArgumentException("Bad address");
538            }
539            if (mConfig.dnsServers == null) {
540                mConfig.dnsServers = new ArrayList<String>();
541            }
542            mConfig.dnsServers.add(address.getHostAddress());
543            return this;
544        }
545
546        /**
547         * Convenience method to add a DNS server to the VPN connection
548         * using a numeric address string. See {@link InetAddress} for the
549         * definitions of numeric address formats.
550         *
551         * Adding a server implicitly allows traffic from that address family
552         * (i.e., IPv4 or IPv6) to be routed over the VPN. @see #allowFamily
553         *
554         * @throws IllegalArgumentException if the address is invalid.
555         * @see #addDnsServer(InetAddress)
556         */
557        public Builder addDnsServer(String address) {
558            return addDnsServer(InetAddress.parseNumericAddress(address));
559        }
560
561        /**
562         * Add a search domain to the DNS resolver.
563         */
564        public Builder addSearchDomain(String domain) {
565            if (mConfig.searchDomains == null) {
566                mConfig.searchDomains = new ArrayList<String>();
567            }
568            mConfig.searchDomains.add(domain);
569            return this;
570        }
571
572        /**
573         * Allows traffic from the specified address family.
574         *
575         * By default, if no address, route or DNS server of a specific family (IPv4 or IPv6) is
576         * added to this VPN, then all outgoing traffic of that family is blocked. If any address,
577         * route or DNS server is added, that family is allowed.
578         *
579         * This method allows an address family to be unblocked even without adding an address,
580         * route or DNS server of that family. Traffic of that family will then typically
581         * fall-through to the underlying network if it's supported.
582         *
583         * {@code family} must be either {@code AF_INET} (for IPv4) or {@code AF_INET6} (for IPv6).
584         * {@link IllegalArgumentException} is thrown if it's neither.
585         *
586         * @param family The address family ({@code AF_INET} or {@code AF_INET6}) to allow.
587         *
588         * @return this {@link Builder} object to facilitate chaining of method calls.
589         */
590        public Builder allowFamily(int family) {
591            if (family == AF_INET) {
592                mConfig.allowIPv4 = true;
593            } else if (family == AF_INET6) {
594                mConfig.allowIPv6 = true;
595            } else {
596                throw new IllegalArgumentException(family + " is neither " + AF_INET + " nor " +
597                        AF_INET6);
598            }
599            return this;
600        }
601
602        private void verifyApp(String packageName) throws PackageManager.NameNotFoundException {
603            IPackageManager pm = IPackageManager.Stub.asInterface(
604                    ServiceManager.getService("package"));
605            try {
606                pm.getApplicationInfo(packageName, 0, UserHandle.getCallingUserId());
607            } catch (RemoteException e) {
608                throw new IllegalStateException(e);
609            }
610        }
611
612        /**
613         * Adds an application that's allowed to access the VPN connection.
614         *
615         * If this method is called at least once, only applications added through this method (and
616         * no others) are allowed access. Else (if this method is never called), all applications
617         * are allowed by default.  If some applications are added, other, un-added applications
618         * will use networking as if the VPN wasn't running.
619         *
620         * A {@link Builder} may have only a set of allowed applications OR a set of disallowed
621         * ones, but not both. Calling this method after {@link #addDisallowedApplication} has
622         * already been called, or vice versa, will throw an {@link UnsupportedOperationException}.
623         *
624         * {@code packageName} must be the canonical name of a currently installed application.
625         * {@link PackageManager.NameNotFoundException} is thrown if there's no such application.
626         *
627         * @throws {@link PackageManager.NameNotFoundException} If the application isn't installed.
628         *
629         * @param packageName The full name (e.g.: "com.google.apps.contacts") of an application.
630         *
631         * @return this {@link Builder} object to facilitate chaining method calls.
632         */
633        public Builder addAllowedApplication(String packageName)
634                throws PackageManager.NameNotFoundException {
635            if (mConfig.disallowedApplications != null) {
636                throw new UnsupportedOperationException("addDisallowedApplication already called");
637            }
638            verifyApp(packageName);
639            if (mConfig.allowedApplications == null) {
640                mConfig.allowedApplications = new ArrayList<String>();
641            }
642            mConfig.allowedApplications.add(packageName);
643            return this;
644        }
645
646        /**
647         * Adds an application that's denied access to the VPN connection.
648         *
649         * By default, all applications are allowed access, except for those denied through this
650         * method.  Denied applications will use networking as if the VPN wasn't running.
651         *
652         * A {@link Builder} may have only a set of allowed applications OR a set of disallowed
653         * ones, but not both. Calling this method after {@link #addAllowedApplication} has already
654         * been called, or vice versa, will throw an {@link UnsupportedOperationException}.
655         *
656         * {@code packageName} must be the canonical name of a currently installed application.
657         * {@link PackageManager.NameNotFoundException} is thrown if there's no such application.
658         *
659         * @throws {@link PackageManager.NameNotFoundException} If the application isn't installed.
660         *
661         * @param packageName The full name (e.g.: "com.google.apps.contacts") of an application.
662         *
663         * @return this {@link Builder} object to facilitate chaining method calls.
664         */
665        public Builder addDisallowedApplication(String packageName)
666                throws PackageManager.NameNotFoundException {
667            if (mConfig.allowedApplications != null) {
668                throw new UnsupportedOperationException("addAllowedApplication already called");
669            }
670            verifyApp(packageName);
671            if (mConfig.disallowedApplications == null) {
672                mConfig.disallowedApplications = new ArrayList<String>();
673            }
674            mConfig.disallowedApplications.add(packageName);
675            return this;
676        }
677
678        /**
679         * Allows all apps to bypass this VPN connection.
680         *
681         * By default, all traffic from apps is forwarded through the VPN interface and it is not
682         * possible for apps to side-step the VPN. If this method is called, apps may use methods
683         * such as {@link ConnectivityManager#bindProcessToNetwork} to instead send/receive
684         * directly over the underlying network or any other network they have permissions for.
685         *
686         * @return this {@link Builder} object to facilitate chaining of method calls.
687         */
688        public Builder allowBypass() {
689            mConfig.allowBypass = true;
690            return this;
691        }
692
693        /**
694         * Sets the VPN interface's file descriptor to be in blocking/non-blocking mode.
695         *
696         * By default, the file descriptor returned by {@link #establish} is non-blocking.
697         *
698         * @param blocking True to put the descriptor into blocking mode; false for non-blocking.
699         *
700         * @return this {@link Builder} object to facilitate chaining method calls.
701         */
702        public Builder setBlocking(boolean blocking) {
703            mConfig.blocking = blocking;
704            return this;
705        }
706
707        /**
708         * Sets the underlying networks used by the VPN for its upstream connections.
709         *
710         * @see VpnService#setUnderlyingNetworks
711         *
712         * @param networks An array of networks the VPN uses to tunnel traffic to/from its servers.
713         *
714         * @return this {@link Builder} object to facilitate chaining method calls.
715         */
716        public Builder setUnderlyingNetworks(Network[] networks) {
717            mConfig.underlyingNetworks = networks != null ? networks.clone() : null;
718            return this;
719        }
720
721        /**
722         * Create a VPN interface using the parameters supplied to this
723         * builder. The interface works on IP packets, and a file descriptor
724         * is returned for the application to access them. Each read
725         * retrieves an outgoing packet which was routed to the interface.
726         * Each write injects an incoming packet just like it was received
727         * from the interface. The file descriptor is put into non-blocking
728         * mode by default to avoid blocking Java threads. To use the file
729         * descriptor completely in native space, see
730         * {@link ParcelFileDescriptor#detachFd()}. The application MUST
731         * close the file descriptor when the VPN connection is terminated.
732         * The VPN interface will be removed and the network will be
733         * restored by the system automatically.
734         *
735         * <p>To avoid conflicts, there can be only one active VPN interface
736         * at the same time. Usually network parameters are never changed
737         * during the lifetime of a VPN connection. It is also common for an
738         * application to create a new file descriptor after closing the
739         * previous one. However, it is rare but not impossible to have two
740         * interfaces while performing a seamless handover. In this case, the
741         * old interface will be deactivated when the new one is created
742         * successfully. Both file descriptors are valid but now outgoing
743         * packets will be routed to the new interface. Therefore, after
744         * draining the old file descriptor, the application MUST close it
745         * and start using the new file descriptor. If the new interface
746         * cannot be created, the existing interface and its file descriptor
747         * remain untouched.
748         *
749         * <p>An exception will be thrown if the interface cannot be created
750         * for any reason. However, this method returns {@code null} if the
751         * application is not prepared or is revoked. This helps solve
752         * possible race conditions between other VPN applications.
753         *
754         * @return {@link ParcelFileDescriptor} of the VPN interface, or
755         *         {@code null} if the application is not prepared.
756         * @throws IllegalArgumentException if a parameter is not accepted
757         *         by the operating system.
758         * @throws IllegalStateException if a parameter cannot be applied
759         *         by the operating system.
760         * @throws SecurityException if the service is not properly declared
761         *         in {@code AndroidManifest.xml}.
762         * @see VpnService
763         */
764        public ParcelFileDescriptor establish() {
765            mConfig.addresses = mAddresses;
766            mConfig.routes = mRoutes;
767
768            try {
769                return getService().establishVpn(mConfig);
770            } catch (RemoteException e) {
771                throw new IllegalStateException(e);
772            }
773        }
774    }
775}
776