NetworkSecurityPolicy.java revision 403a494d5611b4d782981c39b4ed28b2340a32f9
1/**
2 * Copyright (c) 2015, The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *     http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package android.security;
18
19/**
20 * Network security policy.
21 *
22 * <p>Network stacks/components should honor this policy to make it possible to centrally control
23 * the relevant aspects of network security behavior.
24 *
25 * <p>The policy currently consists of a single flag: whether cleartext network traffic is
26 * permitted. See {@link #isCleartextTrafficPermitted()}.
27 *
28 * @hide
29 */
30public class NetworkSecurityPolicy {
31
32    private static final NetworkSecurityPolicy INSTANCE = new NetworkSecurityPolicy();
33
34    private NetworkSecurityPolicy() {}
35
36    /**
37     * Gets the policy for this process.
38     *
39     * <p>It's fine to cache this reference. Any changes to the policy will be immediately visible
40     * through the reference.
41     */
42    public static NetworkSecurityPolicy getInstance() {
43        return INSTANCE;
44    }
45
46    /**
47     * Returns whether cleartext network traffic (e.g. HTTP, FTP, WebSockets, XMPP, IMAP, SMTP --
48     * without TLS or STARTTLS) is permitted for this process.
49     *
50     * <p>When cleartext network traffic is not permitted, the platform's components (e.g. HTTP and
51     * FTP stacks, {@code WebView}, {@code MediaPlayer}) will refuse this process's requests to use
52     * cleartext traffic. Third-party libraries are strongly encouraged to honor this setting as
53     * well.
54     *
55     * <p>This flag is honored on a best effort basis because it's impossible to prevent all
56     * cleartext traffic from Android applications given the level of access provided to them. For
57     * example, there's no expectation that the {@link java.net.Socket} API will honor this flag
58     * because it cannot determine whether its traffic is in cleartext. However, most network
59     * traffic from applications is handled by higher-level network stacks/components which can
60     * honor this aspect of the policy.
61     */
62    public boolean isCleartextTrafficPermitted() {
63        return libcore.net.NetworkSecurityPolicy.isCleartextTrafficPermitted();
64    }
65
66    /**
67     * Sets whether cleartext network traffic is permitted for this process.
68     *
69     * <p>This method is used by the platform early on in the application's initialization to set
70     * the policy.
71     *
72     * @hide
73     */
74    public void setCleartextTrafficPermitted(boolean permitted) {
75        libcore.net.NetworkSecurityPolicy.setCleartextTrafficPermitted(permitted);
76    }
77}
78