/**@class android.net.VpnService @extends android.app.Service VpnService is a base class for applications to extend and build their own VPN solutions. In general, it creates a virtual network interface, configures addresses and routing rules, and returns a file descriptor to the application. Each read from the descriptor retrieves an outgoing packet which was routed to the interface. Each write to the descriptor injects an incoming packet just like it was received from the interface. The interface is running on Internet Protocol (IP), so packets are always started with IP headers. The application then completes a VPN connection by processing and exchanging packets with the remote server over a tunnel. <p>Letting applications intercept packets raises huge security concerns. A VPN application can easily break the network. Besides, two of them may conflict with each other. The system takes several actions to address these issues. Here are some key points: <ul> <li>User action is required the first time an application creates a VPN connection.</li> <li>There can be only one VPN connection running at the same time. The existing interface is deactivated when a new one is created.</li> <li>A system-managed notification is shown during the lifetime of a VPN connection.</li> <li>A system-managed dialog gives the information of the current VPN connection. It also provides a button to disconnect.</li> <li>The network is restored automatically when the file descriptor is closed. It also covers the cases when a VPN application is crashed or killed by the system.</li> </ul> <p>There are two primary methods in this class: {@link #prepare} and {@link android.net.IpSecTransform.Builder#establish}. The former deals with user action and stops the VPN connection created by another application. The latter creates a VPN interface using the parameters supplied to the {@link android.net.IpSecTransform.Builder}. An application must call {@link #prepare} to grant the right to use other methods in this class, and the right can be revoked at any time. Here are the general steps to create a VPN connection: <ol> <li>When the user presses the button to connect, call {@link #prepare} and launch the returned intent, if non-null.</li> <li>When the application becomes prepared, start the service.</li> <li>Create a tunnel to the remote server and negotiate the network parameters for the VPN connection.</li> <li>Supply those parameters to a {@link android.net.IpSecTransform.Builder} and create a VPN interface by calling {@link android.net.IpSecTransform.Builder#establish}.</li> <li>Process and exchange packets between the tunnel and the returned file descriptor.</li> <li>When {@link #onRevoke} is invoked, close the file descriptor and shut down the tunnel gracefully.</li> </ol> <p>Services extending this class need to be declared with an appropriate permission and intent filter. Their access must be secured by {@link android.Manifest.permission#BIND_VPN_SERVICE} permission, and their intent filter must match {@link #SERVICE_INTERFACE} action. Here is an example of declaring a VPN service in {@code AndroidManifest.xml}: <pre> <service android:name=".ExampleVpnService" android:permission="android.permission.BIND_VPN_SERVICE"> <intent-filter> <action android:name="android.net.VpnService"/> </intent-filter> </service></pre> <p> The Android system starts a VPN in the background by calling {@link android.content.Context#startService startService()}. In Android 8.0 (API level 26) and higher, the system places VPN apps on the temporary whitelist for a short period so the app can start in the background. The VPN app must promote itself to the foreground after it's launched or the system will shut down the app. <h3>Developer's guide</h3> <p>To learn more about developing VPN apps, read the <a href="{@docRoot}guide/topics/connectivity/vpn">VPN developer's guide</a>. @see Builder */ var VpnService = { /** The action must be matched by the intent filter of this service. It also needs to require {@link android.Manifest.permission#BIND_VPN_SERVICE} permission so that other applications cannot abuse it. */ SERVICE_INTERFACE : "android.net.VpnService", /** Key for boolean meta-data field indicating whether this VpnService supports always-on mode. <p>For a VPN app targeting {@link android.os.Build.VERSION_CODES#N API 24} or above, Android provides users with the ability to set it as always-on, so that VPN connection is persisted after device reboot and app upgrade. Always-on VPN can also be enabled by device owner and profile owner apps through {@link DevicePolicyManager#setAlwaysOnVpnPackage}. <p>VPN apps not supporting this feature should opt out by adding this meta-data field to the {@code VpnService} component of {@code AndroidManifest.xml}. In case there is more than one {@code VpnService} component defined in {@code AndroidManifest.xml}, opting out any one of them will opt out the entire app. For example, <pre> {@code <service android:name=".ExampleVpnService" android:permission="android.permission.BIND_VPN_SERVICE"> <intent-filter> <action android:name="android.net.VpnService"/> </intent-filter> <meta-data android:name="android.net.VpnService.SUPPORTS_ALWAYS_ON" android:value=false/> </service> } </pre> <p>This meta-data field defaults to {@code true} if absent. It will only have effect on {@link android.os.Build.VERSION_CODES#O_MR1} or higher. */ SERVICE_META_DATA_SUPPORTS_ALWAYS_ON : "android.net.VpnService.SUPPORTS_ALWAYS_ON", /**Prepare to establish a VPN connection. This method returns {@code null} if the VPN application is already prepared or if the user has previously consented to the VPN application. Otherwise, it returns an {@link Intent} to a system activity. The application should launch the activity using {@link Activity#startActivityForResult} to get itself prepared. The activity may pop up a dialog to require user action, and the result will come back via its {@link Activity#onActivityResult}. If the result is {@link Activity#RESULT_OK}, the application becomes prepared and is granted to use other methods in this class. <p>Only one application can be granted at the same time. The right is revoked when another application is granted. The application losing the right will be notified via its {@link #onRevoke}. Unless it becomes prepared again, subsequent calls to other methods in this class will fail. <p>The user may disable the VPN at any time while it is activated, in which case this method will return an intent the next time it is executed to obtain the user's consent again. @see #onRevoke */ prepare : function( ) {}, /**Version of {@link #prepare}(Context) which does not require user consent. <p>Requires {@link android.Manifest.permission#CONTROL_VPN} and should generally not be used. Only acceptable in situations where user consent has been obtained through other means. <p>Once this is run, future preparations may be done with the standard prepare method as this will authorize the package to prepare the VPN without consent in the future. @hide */ prepareAndAuthorize : function( ) {}, /**Protect a socket from VPN connections. After protecting, data sent through this socket will go directly to the underlying network, so its traffic will not be forwarded through the VPN. This method is useful if some connections need to be kept outside of VPN. For example, a VPN tunnel should protect itself if its destination is covered by VPN routes. Otherwise its outgoing packets will be sent back to the VPN interface and cause an infinite loop. This method will fail if the application is not prepared or is revoked. <p class="note">The socket is NOT closed by this method. @return {Boolean} {@code true} on success. */ protect : function( ) {}, /**Convenience method to protect a {@link Socket} from VPN connections. @return {Boolean} {@code true} on success. @see #protect(int) */ protect : function( ) {}, /**Convenience method to protect a {@link DatagramSocket} from VPN connections. @return {Boolean} {@code true} on success. @see #protect(int) */ protect : function( ) {}, /**Adds a network address to the VPN interface. Both IPv4 and IPv6 addresses are supported. The VPN must already be established. Fails if the address is already in use or cannot be assigned to the interface for any other reason. Adding an address implicitly allows traffic from that address family (i.e., IPv4 or IPv6) to be routed over the VPN. @see Builder#allowFamily @param {Object {InetAddress}} address The IP address (IPv4 or IPv6) to assign to the VPN interface. @param {Number} prefixLength The prefix length of the address. @param prefixLength The prefix length of the address. @return {Boolean} {@code true} on success. @see Builder#addAddress @hide */ addAddress : function( ) {}, /**Removes a network address from the VPN interface. Both IPv4 and IPv6 addresses are supported. The VPN must already be established. Fails if the address is not assigned to the VPN interface, or if it is the only address assigned (thus cannot be removed), or if the address cannot be removed for any other reason. After removing an address, if there are no addresses, routes or DNS servers of a particular address family (i.e., IPv4 or IPv6) configured on the VPN, that <b>DOES NOT</b> block that family from being routed. In other words, once an address family has been allowed, it stays allowed for the rest of the VPN's session. @see Builder#allowFamily @param {Object {InetAddress}} address The IP address (IPv4 or IPv6) to assign to the VPN interface. @param {Number} prefixLength The prefix length of the address. @param prefixLength The prefix length of the address. @return {Boolean} {@code true} on success. @hide */ removeAddress : function( ) {}, /**Sets the underlying networks used by the VPN for its upstream connections. <p>Used by the system to know the actual networks that carry traffic for apps affected by this VPN in order to present this information to the user (e.g., via status bar icons). <p>This method only needs to be called if the VPN has explicitly bound its underlying communications channels — such as the socket(s) passed to {@link #protect}(int) — to a {@code Network} using APIs such as {@link android.net.Network#bindSocket(Socket)} or {@link android.net.Network#bindSocket(DatagramSocket)}. The VPN should call this method every time the set of {@code Network}s it is using changes. <p>{@code networks} is one of the following: <ul> <li><strong>a non-empty array</strong>: an array of one or more {@link android.net.Network}s, in decreasing preference order. For example, if this VPN uses both wifi and mobile (cellular) networks to carry app traffic, but prefers or uses wifi more than mobile, wifi should appear first in the array.</li> <li><strong>an empty array</strong>: a zero-element array, meaning that the VPN has no underlying network connection, and thus, app traffic will not be sent or received.</li> <li><strong>null</strong>: (default) signifies that the VPN uses whatever is the system's default network. I.e., it doesn't use the {@code bindSocket} or {@code bindDatagramSocket} APIs mentioned above to send traffic over specific channels.</li> </ul> <p>This call will succeed only if the VPN is currently established. For setting this value when the VPN has not yet been established, see {@link android.net.IpSecTransform.Builder#setUnderlyingNetworks}. @param {Object {android.net.Network[]}} networks An array of networks the VPN uses to tunnel traffic to/from its servers. @return {Boolean} {@code true} on success. */ setUnderlyingNetworks : function( ) {}, /**Returns whether the service is running in always-on VPN mode. In this mode the system ensures that the service is always running by restarting it when necessary, e.g. after reboot. @see DevicePolicyManager#setAlwaysOnVpnPackage(ComponentName, String, boolean, Set) */ isAlwaysOn : function( ) {}, /**Returns whether the service is running in always-on VPN lockdown mode. In this mode the system ensures that the service is always running and that the apps aren't allowed to bypass the VPN. @see DevicePolicyManager#setAlwaysOnVpnPackage(ComponentName, String, boolean, Set) */ isLockdownEnabled : function( ) {}, /**Return the communication interface to the service. This method returns {@code null} on {@link Intent}s other than {@link #SERVICE_INTERFACE} action. Applications overriding this method must identify the intent and return the corresponding interface accordingly. @see Service#onBind */ onBind : function( ) {}, /**Invoked when the application is revoked. At this moment, the VPN interface is already deactivated by the system. The application should close the file descriptor and shut down gracefully. The default implementation of this method is calling {@link Service#stopSelf()}. <p class="note">Calls to this method may not happen on the main thread of the process. @see #prepare */ onRevoke : function( ) {}, };