19ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk/** 29ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk * Copyright (c) 2013, The Android Open Source Project 39ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk * 49ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk * Licensed under the Apache License, Version 2.0 (the "License"); 59ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk * you may not use this file except in compliance with the License. 69ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk * You may obtain a copy of the License at 79ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk * 89ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk * http://www.apache.org/licenses/LICENSE-2.0 99ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk * 109ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk * Unless required by applicable law or agreed to in writing, software 119ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk * distributed under the License is distributed on an "AS IS" BASIS, 129ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 139ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk * See the License for the specific language governing permissions and 149ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk * limitations under the License. 159ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk */ 16602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkpackage com.android.server.connectivity; 17602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 18602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport android.app.AlarmManager; 19602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport android.app.PendingIntent; 20602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport android.content.BroadcastReceiver; 219ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monkimport android.content.ComponentName; 22602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport android.content.ContentResolver; 23602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport android.content.Context; 24602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport android.content.Intent; 25602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport android.content.IntentFilter; 269ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monkimport android.content.ServiceConnection; 27207900c23b26d0df9ab28c709db4a1007d7d7904Jason Monkimport android.net.ProxyInfo; 2883520b95124e0fcaaf3154a7a267f6be0205bc74Jason Monkimport android.net.Uri; 29decd295b1371238c97c170226c6145948492eda1Jason Monkimport android.os.Handler; 307d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensenimport android.os.HandlerThread; 319ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monkimport android.os.IBinder; 32602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport android.os.RemoteException; 33602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport android.os.ServiceManager; 34602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport android.os.SystemClock; 35602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport android.os.SystemProperties; 36602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport android.provider.Settings; 37602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport android.util.Log; 38602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 399ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monkimport com.android.internal.annotations.GuardedBy; 406f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monkimport com.android.net.IProxyCallback; 416f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monkimport com.android.net.IProxyPortListener; 42602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport com.android.net.IProxyService; 43602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 449ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monkimport libcore.io.Streams; 45602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 467d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensenimport java.io.ByteArrayOutputStream; 47602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport java.io.IOException; 48602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport java.net.URL; 49602b232a06ede86999aa362a12eb28cbc782dc1dJason Monkimport java.net.URLConnection; 50602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 51602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk/** 52602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk * @hide 53602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk */ 549ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monkpublic class PacManager { 55da205a749fadb3a87357d9bd607f094c7717764aJason Monk public static final String PAC_PACKAGE = "com.android.pacprocessor"; 56da205a749fadb3a87357d9bd607f094c7717764aJason Monk public static final String PAC_SERVICE = "com.android.pacprocessor.PacService"; 57da205a749fadb3a87357d9bd607f094c7717764aJason Monk public static final String PAC_SERVICE_NAME = "com.android.net.IProxyService"; 58602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 59da205a749fadb3a87357d9bd607f094c7717764aJason Monk public static final String PROXY_PACKAGE = "com.android.proxyhandler"; 60da205a749fadb3a87357d9bd607f094c7717764aJason Monk public static final String PROXY_SERVICE = "com.android.proxyhandler.ProxyService"; 61602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 629ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk private static final String TAG = "PacManager"; 63602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 64602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private static final String ACTION_PAC_REFRESH = "android.net.proxy.PAC_REFRESH"; 65602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 66602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private static final String DEFAULT_DELAYS = "8 32 120 14400 43200"; 67602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private static final int DELAY_1 = 0; 68602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private static final int DELAY_4 = 3; 69602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private static final int DELAY_LONG = 4; 707d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen private static final long MAX_PAC_SIZE = 20 * 1000 * 1000; 71602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 72602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk /** Keep these values up-to-date with ProxyService.java */ 73602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk public static final String KEY_PROXY = "keyProxy"; 74602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private String mCurrentPac; 759ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk @GuardedBy("mProxyLock") 76f6b46cb8b108cc8feee8ae68b979271fd6f72bf5Jason Monk private Uri mPacUrl = Uri.EMPTY; 77602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 78602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private AlarmManager mAlarmManager; 799ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk @GuardedBy("mProxyLock") 80602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private IProxyService mProxyService; 81602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private PendingIntent mPacRefreshIntent; 829ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk private ServiceConnection mConnection; 83da205a749fadb3a87357d9bd607f094c7717764aJason Monk private ServiceConnection mProxyConnection; 84602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private Context mContext; 85602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 86602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private int mCurrentDelay; 876f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk private int mLastPort; 88602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 89d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk private boolean mHasSentBroadcast; 90d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk private boolean mHasDownloaded; 91d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk 92decd295b1371238c97c170226c6145948492eda1Jason Monk private Handler mConnectivityHandler; 93decd295b1371238c97c170226c6145948492eda1Jason Monk private int mProxyMessage; 94decd295b1371238c97c170226c6145948492eda1Jason Monk 959ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk /** 969ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk * Used for locking when setting mProxyService and all references to mPacUrl or mCurrentPac. 979ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk */ 989ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk private final Object mProxyLock = new Object(); 999ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk 1009ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk private Runnable mPacDownloader = new Runnable() { 1019ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk @Override 1029ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk public void run() { 1039ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk String file; 1049ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk synchronized (mProxyLock) { 10583520b95124e0fcaaf3154a7a267f6be0205bc74Jason Monk if (Uri.EMPTY.equals(mPacUrl)) return; 1069ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk try { 1079ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk file = get(mPacUrl); 1089ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } catch (IOException ioe) { 1099ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk file = null; 1109ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk Log.w(TAG, "Failed to load PAC file: " + ioe); 1119ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 1129ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 1139ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk if (file != null) { 1149ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk synchronized (mProxyLock) { 1159ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk if (!file.equals(mCurrentPac)) { 1169ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk setCurrentProxyScript(file); 1179ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 1189ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 119d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk mHasDownloaded = true; 120d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk sendProxyIfNeeded(); 1219ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk longSchedule(); 1229ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } else { 1239ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk reschedule(); 1249ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 1259ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 1269ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk }; 1279ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk 1287d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen private final HandlerThread mNetThread = new HandlerThread("android.pacmanager", 1297d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen android.os.Process.THREAD_PRIORITY_DEFAULT); 1307d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen private final Handler mNetThreadHandler; 1317d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen 132602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk class PacRefreshIntentReceiver extends BroadcastReceiver { 133602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk public void onReceive(Context context, Intent intent) { 1347d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen mNetThreadHandler.post(mPacDownloader); 135602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 136602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 137602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 138decd295b1371238c97c170226c6145948492eda1Jason Monk public PacManager(Context context, Handler handler, int proxyMessage) { 139602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk mContext = context; 1406f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk mLastPort = -1; 1417d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen mNetThread.start(); 1427d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen mNetThreadHandler = new Handler(mNetThread.getLooper()); 143602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 144602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk mPacRefreshIntent = PendingIntent.getBroadcast( 145602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk context, 0, new Intent(ACTION_PAC_REFRESH), 0); 146602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk context.registerReceiver(new PacRefreshIntentReceiver(), 147602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk new IntentFilter(ACTION_PAC_REFRESH)); 148decd295b1371238c97c170226c6145948492eda1Jason Monk mConnectivityHandler = handler; 149decd295b1371238c97c170226c6145948492eda1Jason Monk mProxyMessage = proxyMessage; 150602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 151602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 152602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private AlarmManager getAlarmManager() { 153602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk if (mAlarmManager == null) { 154602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk mAlarmManager = (AlarmManager)mContext.getSystemService(Context.ALARM_SERVICE); 155602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 156602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk return mAlarmManager; 157602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 158602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 1596f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk /** 1606f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk * Updates the PAC Manager with current Proxy information. This is called by 1616f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk * the ConnectivityService directly before a broadcast takes place to allow 1626f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk * the PacManager to indicate that the broadcast should not be sent and the 1636f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk * PacManager will trigger a new broadcast when it is ready. 1646f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk * 1656f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk * @param proxy Proxy information that is about to be broadcast. 1666f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk * @return Returns true when the broadcast should not be sent 1676f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk */ 168207900c23b26d0df9ab28c709db4a1007d7d7904Jason Monk public synchronized boolean setCurrentProxyScriptUrl(ProxyInfo proxy) { 16983520b95124e0fcaaf3154a7a267f6be0205bc74Jason Monk if (!Uri.EMPTY.equals(proxy.getPacFileUrl())) { 17090760c8fa36574d6cc9224046758317ca6f640bfJason Monk if (proxy.getPacFileUrl().equals(mPacUrl) && (proxy.getPort() > 0)) { 171decd295b1371238c97c170226c6145948492eda1Jason Monk // Allow to send broadcast, nothing to do. 172decd295b1371238c97c170226c6145948492eda1Jason Monk return false; 173decd295b1371238c97c170226c6145948492eda1Jason Monk } 1749ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk synchronized (mProxyLock) { 17583520b95124e0fcaaf3154a7a267f6be0205bc74Jason Monk mPacUrl = proxy.getPacFileUrl(); 176602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 1779ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk mCurrentDelay = DELAY_1; 178d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk mHasSentBroadcast = false; 179d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk mHasDownloaded = false; 1809ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk getAlarmManager().cancel(mPacRefreshIntent); 1819ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk bind(); 1826f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk return true; 183602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } else { 1849ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk getAlarmManager().cancel(mPacRefreshIntent); 1859ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk synchronized (mProxyLock) { 186f6b46cb8b108cc8feee8ae68b979271fd6f72bf5Jason Monk mPacUrl = Uri.EMPTY; 1879ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk mCurrentPac = null; 1889ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk if (mProxyService != null) { 1899ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk try { 1909ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk mProxyService.stopPacSystem(); 1919ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } catch (RemoteException e) { 1929ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk Log.w(TAG, "Failed to stop PAC service", e); 1939ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } finally { 1949ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk unbind(); 1959ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 1969ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 197602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 1986f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk return false; 199602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 200602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 201602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 202602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk /** 203602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk * Does a post and reports back the status code. 204602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk * 205602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk * @throws IOException 206602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk */ 20783520b95124e0fcaaf3154a7a267f6be0205bc74Jason Monk private static String get(Uri pacUri) throws IOException { 20883520b95124e0fcaaf3154a7a267f6be0205bc74Jason Monk URL url = new URL(pacUri.toString()); 209602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk URLConnection urlConnection = url.openConnection(java.net.Proxy.NO_PROXY); 2107d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen long contentLength = -1; 2117d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen try { 2127d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen contentLength = Long.parseLong(urlConnection.getHeaderField("Content-Length")); 2137d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen } catch (NumberFormatException e) { 2147d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen // Ignore 2157d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen } 2167d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen if (contentLength > MAX_PAC_SIZE) { 2177d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen throw new IOException("PAC too big: " + contentLength + " bytes"); 2187d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen } 2197d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen ByteArrayOutputStream bytes = new ByteArrayOutputStream(); 2207d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen byte[] buffer = new byte[1024]; 2217d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen int count; 2227d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen while ((count = urlConnection.getInputStream().read(buffer)) != -1) { 2237d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen bytes.write(buffer, 0, count); 2247d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen if (bytes.size() > MAX_PAC_SIZE) { 2257d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen throw new IOException("PAC too big"); 2267d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen } 2277d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen } 2287d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen return bytes.toString(); 229602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 230602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 231602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private int getNextDelay(int currentDelay) { 232602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk if (++currentDelay > DELAY_4) { 233602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk return DELAY_4; 234602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 235602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk return currentDelay; 236602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 237602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 238602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private void longSchedule() { 239602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk mCurrentDelay = DELAY_1; 240602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk setDownloadIn(DELAY_LONG); 241602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 242602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 243602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private void reschedule() { 244602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk mCurrentDelay = getNextDelay(mCurrentDelay); 245602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk setDownloadIn(mCurrentDelay); 246602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 247602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 248602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private String getPacChangeDelay() { 249602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk final ContentResolver cr = mContext.getContentResolver(); 250602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 251602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk /** Check system properties for the default value then use secure settings value, if any. */ 252602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk String defaultDelay = SystemProperties.get( 253602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk "conn." + Settings.Global.PAC_CHANGE_DELAY, 254602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk DEFAULT_DELAYS); 255602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk String val = Settings.Global.getString(cr, Settings.Global.PAC_CHANGE_DELAY); 256602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk return (val == null) ? defaultDelay : val; 257602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 258602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 259602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private long getDownloadDelay(int delayIndex) { 260602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk String[] list = getPacChangeDelay().split(" "); 261602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk if (delayIndex < list.length) { 262602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk return Long.parseLong(list[delayIndex]); 263602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 264602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk return 0; 265602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 266602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 267602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private void setDownloadIn(int delayIndex) { 268602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk long delay = getDownloadDelay(delayIndex); 269602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk long timeTillTrigger = 1000 * delay + SystemClock.elapsedRealtime(); 270602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk getAlarmManager().set(AlarmManager.ELAPSED_REALTIME, timeTillTrigger, mPacRefreshIntent); 271602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 272602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk 273602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk private boolean setCurrentProxyScript(String script) { 274a48ad8bd858d6ffe77838a282dbf71e01967957cWink Saville if (mProxyService == null) { 275a48ad8bd858d6ffe77838a282dbf71e01967957cWink Saville Log.e(TAG, "setCurrentProxyScript: no proxy service"); 276a48ad8bd858d6ffe77838a282dbf71e01967957cWink Saville return false; 277a48ad8bd858d6ffe77838a282dbf71e01967957cWink Saville } 278602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk try { 2799ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk mProxyService.setPacFile(script); 280602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk mCurrentPac = script; 281602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } catch (RemoteException e) { 282602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk Log.e(TAG, "Unable to set PAC file", e); 283602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 284602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk return true; 285602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk } 2869ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk 2879ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk private void bind() { 2889ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk if (mContext == null) { 2899ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk Log.e(TAG, "No context for binding"); 2909ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk return; 2919ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 2929ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk Intent intent = new Intent(); 293da205a749fadb3a87357d9bd607f094c7717764aJason Monk intent.setClassName(PAC_PACKAGE, PAC_SERVICE); 294bc018d89c27cdd93d1c0222a6e27965455974b9eJason Monk if ((mProxyConnection != null) && (mConnection != null)) { 2954bf1d218576fa5721bab589cd5945dbe49f0d117Jason Monk // Already bound no need to bind again, just download the new file. 296baae57ab24db7d3b0bf7f84c05954173f1ee15fePaul Jensen mNetThreadHandler.post(mPacDownloader); 2976f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk return; 2986f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk } 2999ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk mConnection = new ServiceConnection() { 3009ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk @Override 3019ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk public void onServiceDisconnected(ComponentName component) { 3029ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk synchronized (mProxyLock) { 3039ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk mProxyService = null; 3049ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 3059ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 3069ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk 3079ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk @Override 3089ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk public void onServiceConnected(ComponentName component, IBinder binder) { 3099ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk synchronized (mProxyLock) { 3109ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk try { 311da205a749fadb3a87357d9bd607f094c7717764aJason Monk Log.d(TAG, "Adding service " + PAC_SERVICE_NAME + " " 3129ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk + binder.getInterfaceDescriptor()); 3139ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } catch (RemoteException e1) { 3149ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk Log.e(TAG, "Remote Exception", e1); 3159ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 316da205a749fadb3a87357d9bd607f094c7717764aJason Monk ServiceManager.addService(PAC_SERVICE_NAME, binder); 3179ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk mProxyService = IProxyService.Stub.asInterface(binder); 3189ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk if (mProxyService == null) { 3199ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk Log.e(TAG, "No proxy service"); 3209ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } else { 3219ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk try { 3229ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk mProxyService.startPacSystem(); 3239ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } catch (RemoteException e) { 3249ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk Log.e(TAG, "Unable to reach ProxyService - PAC will not be started", e); 3259ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 3267d2198b586bcfbf96fb627021a0eb85d32829cc0Paul Jensen mNetThreadHandler.post(mPacDownloader); 3279ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 3289ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 3299ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 3309ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk }; 3319ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk mContext.bindService(intent, mConnection, 3329ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk Context.BIND_AUTO_CREATE | Context.BIND_NOT_FOREGROUND | Context.BIND_NOT_VISIBLE); 333da205a749fadb3a87357d9bd607f094c7717764aJason Monk 334da205a749fadb3a87357d9bd607f094c7717764aJason Monk intent = new Intent(); 335da205a749fadb3a87357d9bd607f094c7717764aJason Monk intent.setClassName(PROXY_PACKAGE, PROXY_SERVICE); 336da205a749fadb3a87357d9bd607f094c7717764aJason Monk mProxyConnection = new ServiceConnection() { 337da205a749fadb3a87357d9bd607f094c7717764aJason Monk @Override 338da205a749fadb3a87357d9bd607f094c7717764aJason Monk public void onServiceDisconnected(ComponentName component) { 339da205a749fadb3a87357d9bd607f094c7717764aJason Monk } 340da205a749fadb3a87357d9bd607f094c7717764aJason Monk 341da205a749fadb3a87357d9bd607f094c7717764aJason Monk @Override 342da205a749fadb3a87357d9bd607f094c7717764aJason Monk public void onServiceConnected(ComponentName component, IBinder binder) { 3436f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk IProxyCallback callbackService = IProxyCallback.Stub.asInterface(binder); 3446f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk if (callbackService != null) { 3456f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk try { 3466f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk callbackService.getProxyPort(new IProxyPortListener.Stub() { 3476f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk @Override 3486f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk public void setProxyPort(int port) throws RemoteException { 349d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk if (mLastPort != -1) { 350d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk // Always need to send if port changed 351d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk mHasSentBroadcast = false; 352d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk } 3536f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk mLastPort = port; 3546f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk if (port != -1) { 3556f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk Log.d(TAG, "Local proxy is bound on " + port); 356d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk sendProxyIfNeeded(); 3576f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk } else { 3586f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk Log.e(TAG, "Received invalid port from Local Proxy," 3596f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk + " PAC will not be operational"); 3606f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk } 3616f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk } 3626f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk }); 3636f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk } catch (RemoteException e) { 3646f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk e.printStackTrace(); 3656f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk } 3666f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk } 367da205a749fadb3a87357d9bd607f094c7717764aJason Monk } 368da205a749fadb3a87357d9bd607f094c7717764aJason Monk }; 369da205a749fadb3a87357d9bd607f094c7717764aJason Monk mContext.bindService(intent, mProxyConnection, 370da205a749fadb3a87357d9bd607f094c7717764aJason Monk Context.BIND_AUTO_CREATE | Context.BIND_NOT_FOREGROUND | Context.BIND_NOT_VISIBLE); 3719ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 3729ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk 3739ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk private void unbind() { 374bc018d89c27cdd93d1c0222a6e27965455974b9eJason Monk if (mConnection != null) { 375bc018d89c27cdd93d1c0222a6e27965455974b9eJason Monk mContext.unbindService(mConnection); 376bc018d89c27cdd93d1c0222a6e27965455974b9eJason Monk mConnection = null; 377bc018d89c27cdd93d1c0222a6e27965455974b9eJason Monk } 378bc018d89c27cdd93d1c0222a6e27965455974b9eJason Monk if (mProxyConnection != null) { 379bc018d89c27cdd93d1c0222a6e27965455974b9eJason Monk mContext.unbindService(mProxyConnection); 380bc018d89c27cdd93d1c0222a6e27965455974b9eJason Monk mProxyConnection = null; 381bc018d89c27cdd93d1c0222a6e27965455974b9eJason Monk } 382bc018d89c27cdd93d1c0222a6e27965455974b9eJason Monk mProxyService = null; 383d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk mLastPort = -1; 3846f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk } 3856f8a68f49a7e8cf86104e721a1e8be7568b5f730Jason Monk 386207900c23b26d0df9ab28c709db4a1007d7d7904Jason Monk private void sendPacBroadcast(ProxyInfo proxy) { 387decd295b1371238c97c170226c6145948492eda1Jason Monk mConnectivityHandler.sendMessage(mConnectivityHandler.obtainMessage(mProxyMessage, proxy)); 3889ced3cd9d6ea414523051ec872fffc68f5fdbf08Jason Monk } 389d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk 390d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk private synchronized void sendProxyIfNeeded() { 391d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk if (!mHasDownloaded || (mLastPort == -1)) { 392d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk return; 393d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk } 394d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk if (!mHasSentBroadcast) { 395207900c23b26d0df9ab28c709db4a1007d7d7904Jason Monk sendPacBroadcast(new ProxyInfo(mPacUrl, mLastPort)); 396d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk mHasSentBroadcast = true; 397d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk } 398d443479a45279f8f52daf4034698f2ab3c3e62f1Jason Monk } 399602b232a06ede86999aa362a12eb28cbc782dc1dJason Monk} 400