NetworkSecurityPolicy.java revision 2091ab94568edc20a9a36e8877026d65897d538d
1/** 2 * Copyright (c) 2015, The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17package android.security; 18 19/** 20 * Network security policy. 21 * 22 * <p>Network stacks/components should honor this policy to make it possible to centrally control 23 * the relevant aspects of network security behavior. 24 * 25 * <p>The policy currently consists of a single flag: whether cleartext network traffic is 26 * permitted. See {@link #isCleartextTrafficPermitted()}. 27 */ 28public class NetworkSecurityPolicy { 29 30 private static final NetworkSecurityPolicy INSTANCE = new NetworkSecurityPolicy(); 31 32 private NetworkSecurityPolicy() {} 33 34 /** 35 * Gets the policy for this process. 36 * 37 * <p>It's fine to cache this reference. Any changes to the policy will be immediately visible 38 * through the reference. 39 */ 40 public static NetworkSecurityPolicy getInstance() { 41 return INSTANCE; 42 } 43 44 /** 45 * Returns whether cleartext network traffic (e.g. HTTP, FTP, WebSockets, XMPP, IMAP, SMTP -- 46 * without TLS or STARTTLS) is permitted for all network communication from this process. 47 * 48 * <p>When cleartext network traffic is not permitted, the platform's components (e.g. HTTP and 49 * FTP stacks, {@link android.app.DownloadManager}, {@link android.media.MediaPlayer}) will 50 * refuse this process's requests to use cleartext traffic. Third-party libraries are strongly 51 * encouraged to honor this setting as well. 52 * 53 * <p>This flag is honored on a best effort basis because it's impossible to prevent all 54 * cleartext traffic from Android applications given the level of access provided to them. For 55 * example, there's no expectation that the {@link java.net.Socket} API will honor this flag 56 * because it cannot determine whether its traffic is in cleartext. However, most network 57 * traffic from applications is handled by higher-level network stacks/components which can 58 * honor this aspect of the policy. 59 * 60 * <p>NOTE: {@link android.webkit.WebView} does not honor this flag. 61 */ 62 public boolean isCleartextTrafficPermitted() { 63 return libcore.net.NetworkSecurityPolicy.getInstance().isCleartextTrafficPermitted(); 64 } 65 66 /** 67 * Returns whether cleartext network traffic (e.g. HTTP, FTP, XMPP, IMAP, SMTP -- without 68 * TLS or STARTTLS) is permitted for communicating with {@code hostname} for this process. 69 * 70 * @see #isCleartextTrafficPermitted() 71 * @hide 72 */ 73 public boolean isCleartextTrafficPermitted(String hostname) { 74 return libcore.net.NetworkSecurityPolicy.getInstance() 75 .isCleartextTrafficPermitted(hostname); 76 } 77 78 /** 79 * Sets whether cleartext network traffic is permitted for this process. 80 * 81 * <p>This method is used by the platform early on in the application's initialization to set 82 * the policy. 83 * 84 * @hide 85 */ 86 public void setCleartextTrafficPermitted(boolean permitted) { 87 FrameworkNetworkSecurityPolicy policy = new FrameworkNetworkSecurityPolicy(permitted); 88 libcore.net.NetworkSecurityPolicy.setInstance(policy); 89 } 90} 91