blob: c07138f81e9388c7977e76f6cccaa57e17c07d77 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
|
/*
* Copyright (C) 2017 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License
*/
package com.android.dialer.strictmode;
import android.app.Application;
import android.content.Context;
import android.os.Looper;
import android.os.StrictMode;
import android.os.StrictMode.ThreadPolicy;
import android.preference.PreferenceManager;
import android.support.annotation.AnyThread;
import android.support.v4.os.UserManagerCompat;
import com.android.dialer.buildtype.BuildType;
import com.android.dialer.function.Supplier;
import com.android.dialer.storage.StorageComponent;
/** Utilities for enforcing strict-mode in an app. */
public final class StrictModeUtils {
private static final ThreadPolicy THREAD_NO_PENALTY =
new StrictMode.ThreadPolicy.Builder().permitAll().build();
/**
* Convenience method for disabling and enabling the thread policy death penalty using lambdas.
*
* <p>For example:
*
* <p><code>
* Value foo = StrictModeUtils.bypass(() -> doDiskAccessOnMainThreadReturningValue());
* </code>
*
* <p>The thread policy is only mutated if this is called from the main thread.
*/
@AnyThread
public static <T> T bypass(Supplier<T> supplier) {
if (isStrictModeAllowed() && onMainThread()) {
ThreadPolicy originalPolicy = StrictMode.getThreadPolicy();
StrictMode.setThreadPolicy(THREAD_NO_PENALTY);
try {
return supplier.get();
} finally {
StrictMode.setThreadPolicy(originalPolicy);
}
}
return supplier.get();
}
/**
* Convenience method for disabling and enabling the thread policy death penalty using lambdas.
*
* <p>For example:
*
* <p><code>
* StrictModeUtils.bypass(() -> doDiskAccessOnMainThread());
* </code>
*
* <p>The thread policy is only mutated if this is called from the main thread.
*/
@AnyThread
public static void bypass(Runnable runnable) {
if (isStrictModeAllowed() && onMainThread()) {
ThreadPolicy originalPolicy = StrictMode.getThreadPolicy();
StrictMode.setThreadPolicy(THREAD_NO_PENALTY);
try {
runnable.run();
} finally {
StrictMode.setThreadPolicy(originalPolicy);
}
} else {
runnable.run();
}
}
public static boolean isStrictModeAllowed() {
return BuildType.get() == BuildType.BUGFOOD;
}
private static boolean onMainThread() {
return Looper.getMainLooper().equals(Looper.myLooper());
}
/**
* We frequently access shared preferences on the main thread, which causes strict mode
* violations. When strict mode is allowed, warm up the shared preferences so that later uses of
* shared preferences access the in-memory versions and we don't have to bypass strict mode at
* every point in the application where shared preferences are accessed.
*/
public static void warmupSharedPrefs(Application application) {
// From credential-encrypted (CE) storage, i.e.:
// /data/data/com.android.dialer/shared_prefs
if (UserManagerCompat.isUserUnlocked(application)) {
// <package_name>_preferences.xml
PreferenceManager.getDefaultSharedPreferences(application);
// <package_name>.xml
application.getSharedPreferences(application.getPackageName(), Context.MODE_PRIVATE);
}
// From device-encrypted (DE) storage, i.e.:
// /data/user_de/0/com.android.dialer/shared_prefs/
// <package_name>_preferences.xml
StorageComponent.get(application).unencryptedSharedPrefs();
}
private StrictModeUtils() {}
}
|