├── .github └── ISSUE_TEMPLATE │ ├── bug_report.md │ └── feature_request.md ├── .gitignore ├── .travis.yml ├── LICENSE ├── README.md ├── build.gradle ├── gradle.properties ├── gradle └── wrapper │ ├── gradle-wrapper.jar │ └── gradle-wrapper.properties ├── gradlew ├── gradlew.bat ├── lib ├── bintray.gradle ├── build.gradle ├── install.gradle ├── jitpack.gradle ├── proguard-rules.pro └── src │ ├── main │ ├── AndroidManifest.xml │ └── java │ │ └── com │ │ └── tbruyelle │ │ └── rxpermissions3 │ │ ├── Permission.java │ │ ├── RxPermissions.java │ │ └── RxPermissionsFragment.java │ └── test │ └── java │ └── com │ └── tbruyelle │ └── rxpermissions3 │ └── RxPermissionsTest.java ├── sample ├── build.gradle └── src │ ├── main │ ├── AndroidManifest.xml │ ├── java │ │ └── com │ │ │ └── tbruyelle │ │ │ └── rxpermissions3 │ │ │ └── sample │ │ │ └── MainActivity.java │ └── res │ │ ├── layout │ │ └── act_main.xml │ │ ├── mipmap-hdpi │ │ └── ic_launcher.png │ │ ├── mipmap-mdpi │ │ └── ic_launcher.png │ │ ├── mipmap-xhdpi │ │ └── ic_launcher.png │ │ ├── mipmap-xxhdpi │ │ └── ic_launcher.png │ │ └── values │ │ └── strings.xml │ └── test │ └── java │ └── com │ └── tbruyelle │ └── rxpermissions │ └── sample │ └── RxPermissionsSampleTest.java └── settings.gradle /.github/ISSUE_TEMPLATE/bug_report.md: -------------------------------------------------------------------------------- 1 | --- 2 | name: Bug report 3 | about: 'Create a bug report. ' 4 | title: Bug 5 | labels: '' 6 | assignees: '' 7 | 8 | --- 9 | 10 | ### Prerequisites 11 | 12 | * [] Put an X between the brackets on this line if you have done all of the following: 13 | * Read carefully README: https://github.com/tbruyelle/RxPermissions#rxpermissions 14 | * Checked that your issue isn't already filed: https://github.com/tbruyelle/RxPermissions/issues 15 | 16 | ### Issue description 17 | [A clear and concise description of what the bug is.] 18 | 19 | ### Actual behavior 20 | [A clear and concise description of what actually happened.] 21 | 22 | ### Expected behavior 23 | [A clear and concise description of what you expected to happen.] 24 | 25 | ### Steps To Reproduce 26 | Steps to reproduce the behavior: 27 | 1. [First Step] 28 | 2. [Second Step] 29 | 3. [and so on...] 30 | 31 | ### RxPermission usage code **(extremely Required)** 32 | Give a comprehensive example of how exactly RxPermission is used (Use [gists](https://gist.github.com/) or style code with styling markdown). 33 | Provide all info from the beginning that includes: 34 | - How and where RxPermission was instantiated. 35 | - In what lifecycle method. Activity or fragment. Give info about screen view hierarchy if it really complicated and has many nested Fragments. 36 | - Some additional info or important context if needed. 37 | 38 | ### Lib Version 39 | Give info about what lib version do you use 40 | 41 | **Screenshots** 42 | Add screenshots to help explain your problem only If it will be handy for your use case. 43 | If issued only with particular device provide device info 44 | - Device: [e.g. Nexus 5] 45 | - OS version: [Android 5.1] 46 | -------------------------------------------------------------------------------- /.github/ISSUE_TEMPLATE/feature_request.md: -------------------------------------------------------------------------------- 1 | --- 2 | name: Feature request 3 | about: Suggest an idea 4 | title: '' 5 | labels: '' 6 | assignees: '' 7 | 8 | --- 9 | 10 | **Is your feature request related to a problem? Please describe.** 11 | A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] 12 | 13 | **Describe the solution you'd like** 14 | A clear and concise description of what you want to happen. 15 | 16 | **Describe alternatives you've considered** 17 | A clear and concise description of any alternative solutions or features you've considered. 18 | 19 | **Additional context** 20 | Add any other context or screenshots about the feature request here. 21 | -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | local.properties 2 | .idea 3 | *.iml 4 | .gradle 5 | build 6 | 7 | .DS_STORE -------------------------------------------------------------------------------- /.travis.yml: -------------------------------------------------------------------------------- 1 | language: android 2 | dist: trusty 3 | 4 | android: 5 | components: 6 | - tools 7 | - build-tools-29.0.3 8 | - android-29 9 | - extra-android-m2repository 10 | 11 | jdk: oraclejdk8 12 | 13 | notifications: 14 | email: false 15 | 16 | sudo: false 17 | 18 | before_script: 19 | - mkdir "$ANDROID_HOME/licenses" || true 20 | - echo "24333f8a63b6825ea9c5514f83c2829b004d1fee" > "$ANDROID_HOME/licenses/android-sdk-license" 21 | 22 | cache: 23 | directories: 24 | - $HOME/.gradle 25 | 26 | script: ./gradlew test 27 | -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | Apache License 2 | Version 2.0, January 2004 3 | http://www.apache.org/licenses/ 4 | 5 | TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 6 | 7 | 1. Definitions. 8 | 9 | "License" shall mean the terms and conditions for use, reproduction, 10 | and distribution as defined by Sections 1 through 9 of this document. 11 | 12 | "Licensor" shall mean the copyright owner or entity authorized by 13 | the copyright owner that is granting the License. 14 | 15 | "Legal Entity" shall mean the union of the acting entity and all 16 | other entities that control, are controlled by, or are under common 17 | control with that entity. For the purposes of this definition, 18 | "control" means (i) the power, direct or indirect, to cause the 19 | direction or management of such entity, whether by contract or 20 | otherwise, or (ii) ownership of fifty percent (50%) or more of the 21 | outstanding shares, or (iii) beneficial ownership of such entity. 22 | 23 | "You" (or "Your") shall mean an individual or Legal Entity 24 | exercising permissions granted by this License. 25 | 26 | "Source" form shall mean the preferred form for making modifications, 27 | including but not limited to software source code, documentation 28 | source, and configuration files. 29 | 30 | "Object" form shall mean any form resulting from mechanical 31 | transformation or translation of a Source form, including but 32 | not limited to compiled object code, generated documentation, 33 | and conversions to other media types. 34 | 35 | "Work" shall mean the work of authorship, whether in Source or 36 | Object form, made available under the License, as indicated by a 37 | copyright notice that is included in or attached to the work 38 | (an example is provided in the Appendix below). 39 | 40 | "Derivative Works" shall mean any work, whether in Source or Object 41 | form, that is based on (or derived from) the Work and for which the 42 | editorial revisions, annotations, elaborations, or other modifications 43 | represent, as a whole, an original work of authorship. For the purposes 44 | of this License, Derivative Works shall not include works that remain 45 | separable from, or merely link (or bind by name) to the interfaces of, 46 | the Work and Derivative Works thereof. 47 | 48 | "Contribution" shall mean any work of authorship, including 49 | the original version of the Work and any modifications or additions 50 | to that Work or Derivative Works thereof, that is intentionally 51 | submitted to Licensor for inclusion in the Work by the copyright owner 52 | or by an individual or Legal Entity authorized to submit on behalf of 53 | the copyright owner. For the purposes of this definition, "submitted" 54 | means any form of electronic, verbal, or written communication sent 55 | to the Licensor or its representatives, including but not limited to 56 | communication on electronic mailing lists, source code control systems, 57 | and issue tracking systems that are managed by, or on behalf of, the 58 | Licensor for the purpose of discussing and improving the Work, but 59 | excluding communication that is conspicuously marked or otherwise 60 | designated in writing by the copyright owner as "Not a Contribution." 61 | 62 | "Contributor" shall mean Licensor and any individual or Legal Entity 63 | on behalf of whom a Contribution has been received by Licensor and 64 | subsequently incorporated within the Work. 65 | 66 | 2. Grant of Copyright License. Subject to the terms and conditions of 67 | this License, each Contributor hereby grants to You a perpetual, 68 | worldwide, non-exclusive, no-charge, royalty-free, irrevocable 69 | copyright license to reproduce, prepare Derivative Works of, 70 | publicly display, publicly perform, sublicense, and distribute the 71 | Work and such Derivative Works in Source or Object form. 72 | 73 | 3. Grant of Patent License. Subject to the terms and conditions of 74 | this License, each Contributor hereby grants to You a perpetual, 75 | worldwide, non-exclusive, no-charge, royalty-free, irrevocable 76 | (except as stated in this section) patent license to make, have made, 77 | use, offer to sell, sell, import, and otherwise transfer the Work, 78 | where such license applies only to those patent claims licensable 79 | by such Contributor that are necessarily infringed by their 80 | Contribution(s) alone or by combination of their Contribution(s) 81 | with the Work to which such Contribution(s) was submitted. If You 82 | institute patent litigation against any entity (including a 83 | cross-claim or counterclaim in a lawsuit) alleging that the Work 84 | or a Contribution incorporated within the Work constitutes direct 85 | or contributory patent infringement, then any patent licenses 86 | granted to You under this License for that Work shall terminate 87 | as of the date such litigation is filed. 88 | 89 | 4. Redistribution. You may reproduce and distribute copies of the 90 | Work or Derivative Works thereof in any medium, with or without 91 | modifications, and in Source or Object form, provided that You 92 | meet the following conditions: 93 | 94 | (a) You must give any other recipients of the Work or 95 | Derivative Works a copy of this License; and 96 | 97 | (b) You must cause any modified files to carry prominent notices 98 | stating that You changed the files; and 99 | 100 | (c) You must retain, in the Source form of any Derivative Works 101 | that You distribute, all copyright, patent, trademark, and 102 | attribution notices from the Source form of the Work, 103 | excluding those notices that do not pertain to any part of 104 | the Derivative Works; and 105 | 106 | (d) If the Work includes a "NOTICE" text file as part of its 107 | distribution, then any Derivative Works that You distribute must 108 | include a readable copy of the attribution notices contained 109 | within such NOTICE file, excluding those notices that do not 110 | pertain to any part of the Derivative Works, in at least one 111 | of the following places: within a NOTICE text file distributed 112 | as part of the Derivative Works; within the Source form or 113 | documentation, if provided along with the Derivative Works; or, 114 | within a display generated by the Derivative Works, if and 115 | wherever such third-party notices normally appear. The contents 116 | of the NOTICE file are for informational purposes only and 117 | do not modify the License. You may add Your own attribution 118 | notices within Derivative Works that You distribute, alongside 119 | or as an addendum to the NOTICE text from the Work, provided 120 | that such additional attribution notices cannot be construed 121 | as modifying the License. 122 | 123 | You may add Your own copyright statement to Your modifications and 124 | may provide additional or different license terms and conditions 125 | for use, reproduction, or distribution of Your modifications, or 126 | for any such Derivative Works as a whole, provided Your use, 127 | reproduction, and distribution of the Work otherwise complies with 128 | the conditions stated in this License. 129 | 130 | 5. Submission of Contributions. Unless You explicitly state otherwise, 131 | any Contribution intentionally submitted for inclusion in the Work 132 | by You to the Licensor shall be under the terms and conditions of 133 | this License, without any additional terms or conditions. 134 | Notwithstanding the above, nothing herein shall supersede or modify 135 | the terms of any separate license agreement you may have executed 136 | with Licensor regarding such Contributions. 137 | 138 | 6. Trademarks. This License does not grant permission to use the trade 139 | names, trademarks, service marks, or product names of the Licensor, 140 | except as required for reasonable and customary use in describing the 141 | origin of the Work and reproducing the content of the NOTICE file. 142 | 143 | 7. Disclaimer of Warranty. Unless required by applicable law or 144 | agreed to in writing, Licensor provides the Work (and each 145 | Contributor provides its Contributions) on an "AS IS" BASIS, 146 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or 147 | implied, including, without limitation, any warranties or conditions 148 | of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A 149 | PARTICULAR PURPOSE. You are solely responsible for determining the 150 | appropriateness of using or redistributing the Work and assume any 151 | risks associated with Your exercise of permissions under this License. 152 | 153 | 8. Limitation of Liability. In no event and under no legal theory, 154 | whether in tort (including negligence), contract, or otherwise, 155 | unless required by applicable law (such as deliberate and grossly 156 | negligent acts) or agreed to in writing, shall any Contributor be 157 | liable to You for damages, including any direct, indirect, special, 158 | incidental, or consequential damages of any character arising as a 159 | result of this License or out of the use or inability to use the 160 | Work (including but not limited to damages for loss of goodwill, 161 | work stoppage, computer failure or malfunction, or any and all 162 | other commercial damages or losses), even if such Contributor 163 | has been advised of the possibility of such damages. 164 | 165 | 9. Accepting Warranty or Additional Liability. While redistributing 166 | the Work or Derivative Works thereof, You may choose to offer, 167 | and charge a fee for, acceptance of support, warranty, indemnity, 168 | or other liability obligations and/or rights consistent with this 169 | License. However, in accepting such obligations, You may act only 170 | on Your own behalf and on Your sole responsibility, not on behalf 171 | of any other Contributor, and only if You agree to indemnify, 172 | defend, and hold each Contributor harmless for any liability 173 | incurred by, or claims asserted against, such Contributor by reason 174 | of your accepting any such warranty or additional liability. 175 | 176 | END OF TERMS AND CONDITIONS 177 | 178 | APPENDIX: How to apply the Apache License to your work. 179 | 180 | To apply the Apache License to your work, attach the following 181 | boilerplate notice, with the fields enclosed by brackets "{}" 182 | replaced with your own identifying information. (Don't include 183 | the brackets!) The text should be enclosed in the appropriate 184 | comment syntax for the file format. We also recommend that a 185 | file or class name and description of purpose be included on the 186 | same "printed page" as the copyright notice for easier 187 | identification within third-party archives. 188 | 189 | Copyright {yyyy} {name of copyright owner} 190 | 191 | Licensed under the Apache License, Version 2.0 (the "License"); 192 | you may not use this file except in compliance with the License. 193 | You may obtain a copy of the License at 194 | 195 | http://www.apache.org/licenses/LICENSE-2.0 196 | 197 | Unless required by applicable law or agreed to in writing, software 198 | distributed under the License is distributed on an "AS IS" BASIS, 199 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 200 | See the License for the specific language governing permissions and 201 | limitations under the License. 202 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # RxPermissions 2 | 3 | [![](https://jitpack.io/v/tbruyelle/RxPermissions.svg)](https://jitpack.io/#tbruyelle/RxPermissions) [![BuildVersion](https://buildstats.info/nuget/RxPermissions)](https://www.nuget.org/packages/RxPermissions/) [![Build Status](https://api.travis-ci.org/tbruyelle/RxPermissions.svg?branch=master)](https://travis-ci.org/tbruyelle/RxPermissions) 4 | 5 | This library allows the usage of RxJava with the new Android M permission model. 6 | 7 | ## Setup 8 | 9 | To use this library your `minSdkVersion` must be >= 14. 10 | 11 | ```gradle 12 | allprojects { 13 | repositories { 14 | ... 15 | maven { url 'https://jitpack.io' } 16 | } 17 | } 18 | 19 | dependencies { 20 | implementation 'com.github.tbruyelle:rxpermissions:0.12' 21 | } 22 | ``` 23 | 24 | ## Usage 25 | 26 | Create a `RxPermissions` instance : 27 | 28 | ```java 29 | final RxPermissions rxPermissions = new RxPermissions(this); // where this is an Activity or Fragment instance 30 | ``` 31 | 32 | **NOTE:** `new RxPermissions(this)` the `this` parameter can be a FragmentActivity or a Fragment. If you are using `RxPermissions` inside of a fragment you should pass the fragment instance(`new RxPermissions(this)`) as constructor parameter rather than `new RxPermissions(fragment.getActivity())` or you could face a `java.lang.IllegalStateException: FragmentManager is already executing transactions`. 33 | 34 | Example : request the CAMERA permission (with Retrolambda for brevity, but not required) 35 | 36 | ```java 37 | // Must be done during an initialization phase like onCreate 38 | rxPermissions 39 | .request(Manifest.permission.CAMERA) 40 | .subscribe(granted -> { 41 | if (granted) { // Always true pre-M 42 | // I can control the camera now 43 | } else { 44 | // Oups permission denied 45 | } 46 | }); 47 | ``` 48 | 49 | If you need to trigger the permission request from a specific event, you need to setup your event 50 | as an observable inside an initialization phase. 51 | 52 | You can use [JakeWharton/RxBinding](https://github.com/JakeWharton/RxBinding) to turn your view to 53 | an observable (not included in the library). 54 | 55 | Example : 56 | 57 | ```java 58 | // Must be done during an initialization phase like onCreate 59 | RxView.clicks(findViewById(R.id.enableCamera)) 60 | .compose(rxPermissions.ensure(Manifest.permission.CAMERA)) 61 | .subscribe(granted -> { 62 | // R.id.enableCamera has been clicked 63 | }); 64 | ``` 65 | 66 | If multiple permissions at the same time, the result is combined : 67 | 68 | ```java 69 | rxPermissions 70 | .request(Manifest.permission.CAMERA, 71 | Manifest.permission.READ_PHONE_STATE) 72 | .subscribe(granted -> { 73 | if (granted) { 74 | // All requested permissions are granted 75 | } else { 76 | // At least one permission is denied 77 | } 78 | }); 79 | ``` 80 | 81 | You can also observe a detailed result with `requestEach` or `ensureEach` : 82 | 83 | ```java 84 | rxPermissions 85 | .requestEach(Manifest.permission.CAMERA, 86 | Manifest.permission.READ_PHONE_STATE) 87 | .subscribe(permission -> { // will emit 2 Permission objects 88 | if (permission.granted) { 89 | // `permission.name` is granted ! 90 | } else if (permission.shouldShowRequestPermissionRationale) { 91 | // Denied permission without ask never again 92 | } else { 93 | // Denied permission with ask never again 94 | // Need to go to the settings 95 | } 96 | }); 97 | ``` 98 | 99 | You can also get combined detailed result with `requestEachCombined` or `ensureEachCombined` : 100 | 101 | ```java 102 | rxPermissions 103 | .requestEachCombined(Manifest.permission.CAMERA, 104 | Manifest.permission.READ_PHONE_STATE) 105 | .subscribe(permission -> { // will emit 1 Permission object 106 | if (permission.granted) { 107 | // All permissions are granted ! 108 | } else if (permission.shouldShowRequestPermissionRationale) 109 | // At least one denied permission without ask never again 110 | } else { 111 | // At least one denied permission with ask never again 112 | // Need to go to the settings 113 | } 114 | }); 115 | ``` 116 | 117 | Look at the `sample` app for more. 118 | 119 | ## Important read 120 | 121 | **As mentioned above, because your app may be restarted during the permission request, the request 122 | must be done during an initialization phase**. This may be `Activity.onCreate`, or 123 | `View.onFinishInflate`, but not *pausing* methods like `onResume`, because you'll potentially create an infinite request loop, as your requesting activity is paused by the framework during the permission request. 124 | 125 | If not, and if your app is restarted during the permission request (because of a configuration 126 | change for instance), the user's answer will never be emitted to the subscriber. 127 | 128 | You can find more details about that [here](https://github.com/tbruyelle/RxPermissions/issues/69). 129 | 130 | ## Status 131 | 132 | This library is still beta, so contributions are welcome. 133 | I'm currently using it in production since months without issue. 134 | 135 | ## Benefits 136 | 137 | - Avoid worrying about the framework version. If the sdk is pre-M, the observer will automatically 138 | receive a granted result. 139 | 140 | - Prevents you to split your code between the permission request and the result handling. 141 | Currently without this library you have to request the permission in one place and handle the result 142 | in `Activity.onRequestPermissionsResult()`. 143 | 144 | - All what RX provides about transformation, filter, chaining... 145 | 146 | # License 147 | 148 | ``` 149 | Copyright (C) 2015 Thomas Bruyelle 150 | 151 | Licensed under the Apache License, Version 2.0 (the "License"); 152 | you may not use this file except in compliance with the License. 153 | You may obtain a copy of the License at 154 | 155 | http://www.apache.org/licenses/LICENSE-2.0 156 | 157 | Unless required by applicable law or agreed to in writing, software 158 | distributed under the License is distributed on an "AS IS" BASIS, 159 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 160 | See the License for the specific language governing permissions and 161 | limitations under the License. 162 | ``` 163 | -------------------------------------------------------------------------------- /build.gradle: -------------------------------------------------------------------------------- 1 | buildscript { 2 | repositories { 3 | google() 4 | jcenter() 5 | } 6 | dependencies { 7 | classpath 'com.android.tools.build:gradle:4.0.0' 8 | classpath 'com.jfrog.bintray.gradle:gradle-bintray-plugin:1.8.0' 9 | classpath 'com.github.dcendents:android-maven-gradle-plugin:2.1' 10 | } 11 | } 12 | 13 | allprojects { 14 | repositories { 15 | google() 16 | jcenter() 17 | } 18 | } 19 | 20 | ext { 21 | minSdkVersion = 14 22 | compileSdkVersion = 29 23 | targetSdkVersion = compileSdkVersion 24 | 25 | rxJava = 'io.reactivex.rxjava3:rxjava:3.0.4' 26 | junit = 'junit:junit:4.13' 27 | mockito = 'org.mockito:mockito-core:3.3.3' 28 | 29 | androidXFragment = 'androidx.fragment:fragment:1.2.5' 30 | androidXAnnotation = 'androidx.annotation:annotation:1.1.0' 31 | androidXAppcompat = 'androidx.appcompat:appcompat:1.1.0' 32 | 33 | robolectricVersion = '4.3.1' 34 | robolectric = "org.robolectric:robolectric:$robolectricVersion" 35 | robolectricShadowsSupport = "org.robolectric:shadows-support-v4:$robolectricVersion" 36 | // Workaround for https://github.com/robolectric/robolectric/issues/1932 37 | khronosOpenGLApi = "org.khronos:opengl-api:gl1.1-android-2.1_r1" 38 | 39 | bintrayRepo = 'tbruyelle' 40 | bintrayName = 'RxPermissions3' 41 | 42 | publishedGroupId = 'com.tbruyelle.rxpermissions3' 43 | artifact = 'rxpermissions' 44 | libraryName = 'RxPermissions' 45 | libraryVersion = '0.9.5' 46 | 47 | libraryDescription = 'A wrapper for Android 6.0 permissions' 48 | 49 | siteUrl = 'https://github.com/tbruyelle/RxPermissions' 50 | gitUrl = 'https://github.com/tbruyelle/RxPermissions.git' 51 | 52 | developerId = 'tbruyelle' 53 | developerName = 'Thomas Bruyelle' 54 | developerEmail = 'thomas.bruyelle@gmail.com' 55 | 56 | licenseName = 'The Apache Software License, Version 2.0' 57 | licenseUrl = 'http://www.apache.org/licenses/LICENSE-2.0.txt' 58 | allLicenses = ["Apache-2.0"] 59 | } 60 | -------------------------------------------------------------------------------- /gradle.properties: -------------------------------------------------------------------------------- 1 | # Project-wide Gradle settings. 2 | 3 | # IDE (e.g. Android Studio) users: 4 | # Gradle settings configured through the IDE *will override* 5 | # any settings specified in this file. 6 | 7 | # For more details on how to configure your build environment visit 8 | # http://www.gradle.org/docs/current/userguide/build_environment.html 9 | 10 | # Specifies the JVM arguments used for the daemon process. 11 | # The setting is particularly useful for tweaking memory settings. 12 | org.gradle.jvmargs=-Xmx1536m 13 | 14 | # When configured, Gradle will run in incubating parallel mode. 15 | # This option should only be used with decoupled projects. More details, visit 16 | # http://www.gradle.org/docs/current/userguide/multi_project_builds.html#sec:decoupled_projects 17 | # org.gradle.parallel=true 18 | 19 | android.useAndroidX = true 20 | android.enableJetifier=true -------------------------------------------------------------------------------- /gradle/wrapper/gradle-wrapper.jar: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/tbruyelle/RxPermissions/fd2b50fe8c11f4c62122d78ed4eda51463ae2fdf/gradle/wrapper/gradle-wrapper.jar -------------------------------------------------------------------------------- /gradle/wrapper/gradle-wrapper.properties: -------------------------------------------------------------------------------- 1 | #Thu Jul 09 16:45:02 CEST 2020 2 | distributionBase=GRADLE_USER_HOME 3 | distributionPath=wrapper/dists 4 | zipStoreBase=GRADLE_USER_HOME 5 | zipStorePath=wrapper/dists 6 | distributionUrl=https\://services.gradle.org/distributions/gradle-6.5.1-all.zip 7 | -------------------------------------------------------------------------------- /gradlew: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env sh 2 | 3 | ############################################################################## 4 | ## 5 | ## Gradle start up script for UN*X 6 | ## 7 | ############################################################################## 8 | 9 | # Attempt to set APP_HOME 10 | # Resolve links: $0 may be a link 11 | PRG="$0" 12 | # Need this for relative symlinks. 13 | while [ -h "$PRG" ] ; do 14 | ls=`ls -ld "$PRG"` 15 | link=`expr "$ls" : '.*-> \(.*\)$'` 16 | if expr "$link" : '/.*' > /dev/null; then 17 | PRG="$link" 18 | else 19 | PRG=`dirname "$PRG"`"/$link" 20 | fi 21 | done 22 | SAVED="`pwd`" 23 | cd "`dirname \"$PRG\"`/" >/dev/null 24 | APP_HOME="`pwd -P`" 25 | cd "$SAVED" >/dev/null 26 | 27 | APP_NAME="Gradle" 28 | APP_BASE_NAME=`basename "$0"` 29 | 30 | # Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script. 31 | DEFAULT_JVM_OPTS="" 32 | 33 | # Use the maximum available, or set MAX_FD != -1 to use that value. 34 | MAX_FD="maximum" 35 | 36 | warn ( ) { 37 | echo "$*" 38 | } 39 | 40 | die ( ) { 41 | echo 42 | echo "$*" 43 | echo 44 | exit 1 45 | } 46 | 47 | # OS specific support (must be 'true' or 'false'). 48 | cygwin=false 49 | msys=false 50 | darwin=false 51 | nonstop=false 52 | case "`uname`" in 53 | CYGWIN* ) 54 | cygwin=true 55 | ;; 56 | Darwin* ) 57 | darwin=true 58 | ;; 59 | MINGW* ) 60 | msys=true 61 | ;; 62 | NONSTOP* ) 63 | nonstop=true 64 | ;; 65 | esac 66 | 67 | CLASSPATH=$APP_HOME/gradle/wrapper/gradle-wrapper.jar 68 | 69 | # Determine the Java command to use to start the JVM. 70 | if [ -n "$JAVA_HOME" ] ; then 71 | if [ -x "$JAVA_HOME/jre/sh/java" ] ; then 72 | # IBM's JDK on AIX uses strange locations for the executables 73 | JAVACMD="$JAVA_HOME/jre/sh/java" 74 | else 75 | JAVACMD="$JAVA_HOME/bin/java" 76 | fi 77 | if [ ! -x "$JAVACMD" ] ; then 78 | die "ERROR: JAVA_HOME is set to an invalid directory: $JAVA_HOME 79 | 80 | Please set the JAVA_HOME variable in your environment to match the 81 | location of your Java installation." 82 | fi 83 | else 84 | JAVACMD="java" 85 | which java >/dev/null 2>&1 || die "ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH. 86 | 87 | Please set the JAVA_HOME variable in your environment to match the 88 | location of your Java installation." 89 | fi 90 | 91 | # Increase the maximum file descriptors if we can. 92 | if [ "$cygwin" = "false" -a "$darwin" = "false" -a "$nonstop" = "false" ] ; then 93 | MAX_FD_LIMIT=`ulimit -H -n` 94 | if [ $? -eq 0 ] ; then 95 | if [ "$MAX_FD" = "maximum" -o "$MAX_FD" = "max" ] ; then 96 | MAX_FD="$MAX_FD_LIMIT" 97 | fi 98 | ulimit -n $MAX_FD 99 | if [ $? -ne 0 ] ; then 100 | warn "Could not set maximum file descriptor limit: $MAX_FD" 101 | fi 102 | else 103 | warn "Could not query maximum file descriptor limit: $MAX_FD_LIMIT" 104 | fi 105 | fi 106 | 107 | # For Darwin, add options to specify how the application appears in the dock 108 | if $darwin; then 109 | GRADLE_OPTS="$GRADLE_OPTS \"-Xdock:name=$APP_NAME\" \"-Xdock:icon=$APP_HOME/media/gradle.icns\"" 110 | fi 111 | 112 | # For Cygwin, switch paths to Windows format before running java 113 | if $cygwin ; then 114 | APP_HOME=`cygpath --path --mixed "$APP_HOME"` 115 | CLASSPATH=`cygpath --path --mixed "$CLASSPATH"` 116 | JAVACMD=`cygpath --unix "$JAVACMD"` 117 | 118 | # We build the pattern for arguments to be converted via cygpath 119 | ROOTDIRSRAW=`find -L / -maxdepth 1 -mindepth 1 -type d 2>/dev/null` 120 | SEP="" 121 | for dir in $ROOTDIRSRAW ; do 122 | ROOTDIRS="$ROOTDIRS$SEP$dir" 123 | SEP="|" 124 | done 125 | OURCYGPATTERN="(^($ROOTDIRS))" 126 | # Add a user-defined pattern to the cygpath arguments 127 | if [ "$GRADLE_CYGPATTERN" != "" ] ; then 128 | OURCYGPATTERN="$OURCYGPATTERN|($GRADLE_CYGPATTERN)" 129 | fi 130 | # Now convert the arguments - kludge to limit ourselves to /bin/sh 131 | i=0 132 | for arg in "$@" ; do 133 | CHECK=`echo "$arg"|egrep -c "$OURCYGPATTERN" -` 134 | CHECK2=`echo "$arg"|egrep -c "^-"` ### Determine if an option 135 | 136 | if [ $CHECK -ne 0 ] && [ $CHECK2 -eq 0 ] ; then ### Added a condition 137 | eval `echo args$i`=`cygpath --path --ignore --mixed "$arg"` 138 | else 139 | eval `echo args$i`="\"$arg\"" 140 | fi 141 | i=$((i+1)) 142 | done 143 | case $i in 144 | (0) set -- ;; 145 | (1) set -- "$args0" ;; 146 | (2) set -- "$args0" "$args1" ;; 147 | (3) set -- "$args0" "$args1" "$args2" ;; 148 | (4) set -- "$args0" "$args1" "$args2" "$args3" ;; 149 | (5) set -- "$args0" "$args1" "$args2" "$args3" "$args4" ;; 150 | (6) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" ;; 151 | (7) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" ;; 152 | (8) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" "$args7" ;; 153 | (9) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" "$args7" "$args8" ;; 154 | esac 155 | fi 156 | 157 | # Escape application args 158 | save ( ) { 159 | for i do printf %s\\n "$i" | sed "s/'/'\\\\''/g;1s/^/'/;\$s/\$/' \\\\/" ; done 160 | echo " " 161 | } 162 | APP_ARGS=$(save "$@") 163 | 164 | # Collect all arguments for the java command, following the shell quoting and substitution rules 165 | eval set -- $DEFAULT_JVM_OPTS $JAVA_OPTS $GRADLE_OPTS "\"-Dorg.gradle.appname=$APP_BASE_NAME\"" -classpath "\"$CLASSPATH\"" org.gradle.wrapper.GradleWrapperMain "$APP_ARGS" 166 | 167 | # by default we should be in the correct project dir, but when run from Finder on Mac, the cwd is wrong 168 | if [ "$(uname)" = "Darwin" ] && [ "$HOME" = "$PWD" ]; then 169 | cd "$(dirname "$0")" 170 | fi 171 | 172 | exec "$JAVACMD" "$@" 173 | -------------------------------------------------------------------------------- /gradlew.bat: -------------------------------------------------------------------------------- 1 | @if "%DEBUG%" == "" @echo off 2 | @rem ########################################################################## 3 | @rem 4 | @rem Gradle startup script for Windows 5 | @rem 6 | @rem ########################################################################## 7 | 8 | @rem Set local scope for the variables with windows NT shell 9 | if "%OS%"=="Windows_NT" setlocal 10 | 11 | set DIRNAME=%~dp0 12 | if "%DIRNAME%" == "" set DIRNAME=. 13 | set APP_BASE_NAME=%~n0 14 | set APP_HOME=%DIRNAME% 15 | 16 | @rem Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script. 17 | set DEFAULT_JVM_OPTS= 18 | 19 | @rem Find java.exe 20 | if defined JAVA_HOME goto findJavaFromJavaHome 21 | 22 | set JAVA_EXE=java.exe 23 | %JAVA_EXE% -version >NUL 2>&1 24 | if "%ERRORLEVEL%" == "0" goto init 25 | 26 | echo. 27 | echo ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH. 28 | echo. 29 | echo Please set the JAVA_HOME variable in your environment to match the 30 | echo location of your Java installation. 31 | 32 | goto fail 33 | 34 | :findJavaFromJavaHome 35 | set JAVA_HOME=%JAVA_HOME:"=% 36 | set JAVA_EXE=%JAVA_HOME%/bin/java.exe 37 | 38 | if exist "%JAVA_EXE%" goto init 39 | 40 | echo. 41 | echo ERROR: JAVA_HOME is set to an invalid directory: %JAVA_HOME% 42 | echo. 43 | echo Please set the JAVA_HOME variable in your environment to match the 44 | echo location of your Java installation. 45 | 46 | goto fail 47 | 48 | :init 49 | @rem Get command-line arguments, handling Windows variants 50 | 51 | if not "%OS%" == "Windows_NT" goto win9xME_args 52 | 53 | :win9xME_args 54 | @rem Slurp the command line arguments. 55 | set CMD_LINE_ARGS= 56 | set _SKIP=2 57 | 58 | :win9xME_args_slurp 59 | if "x%~1" == "x" goto execute 60 | 61 | set CMD_LINE_ARGS=%* 62 | 63 | :execute 64 | @rem Setup the command line 65 | 66 | set CLASSPATH=%APP_HOME%\gradle\wrapper\gradle-wrapper.jar 67 | 68 | @rem Execute Gradle 69 | "%JAVA_EXE%" %DEFAULT_JVM_OPTS% %JAVA_OPTS% %GRADLE_OPTS% "-Dorg.gradle.appname=%APP_BASE_NAME%" -classpath "%CLASSPATH%" org.gradle.wrapper.GradleWrapperMain %CMD_LINE_ARGS% 70 | 71 | :end 72 | @rem End local scope for the variables with windows NT shell 73 | if "%ERRORLEVEL%"=="0" goto mainEnd 74 | 75 | :fail 76 | rem Set variable GRADLE_EXIT_CONSOLE if you need the _script_ return code instead of 77 | rem the _cmd.exe /c_ return code! 78 | if not "" == "%GRADLE_EXIT_CONSOLE%" exit 1 79 | exit /b 1 80 | 81 | :mainEnd 82 | if "%OS%"=="Windows_NT" endlocal 83 | 84 | :omega 85 | -------------------------------------------------------------------------------- /lib/bintray.gradle: -------------------------------------------------------------------------------- 1 | apply plugin: 'com.jfrog.bintray' 2 | 3 | version = libraryVersion 4 | 5 | task sourcesJar(type: Jar) { 6 | from android.sourceSets.main.java.srcDirs 7 | classifier = 'sources' 8 | } 9 | 10 | task javadoc(type: Javadoc) { 11 | source = android.sourceSets.main.java.srcDirs 12 | classpath += project.files(android.getBootClasspath().join(File.pathSeparator)) 13 | } 14 | 15 | task javadocJar(type: Jar, dependsOn: javadoc) { 16 | classifier = 'javadoc' 17 | from javadoc.destinationDir 18 | } 19 | artifacts { 20 | archives javadocJar 21 | archives sourcesJar 22 | } 23 | 24 | Properties properties = new Properties() 25 | try { 26 | properties.load(project.rootProject.file('local.properties').newDataInputStream()) 27 | } catch (FileNotFoundException ignore) {} 28 | 29 | bintray { 30 | user = properties.getProperty("bintray.user") 31 | key = properties.getProperty("bintray.apikey") 32 | 33 | configurations = ['archives'] 34 | pkg { 35 | repo = bintrayRepo 36 | name = bintrayName 37 | desc = libraryDescription 38 | websiteUrl = siteUrl 39 | vcsUrl = gitUrl 40 | licenses = allLicenses 41 | publish = true 42 | publicDownloadNumbers = true 43 | version { 44 | desc = libraryDescription 45 | gpg { 46 | sign = false 47 | } 48 | } 49 | } 50 | } 51 | -------------------------------------------------------------------------------- /lib/build.gradle: -------------------------------------------------------------------------------- 1 | apply plugin: 'com.android.library' 2 | apply from: 'jitpack.gradle' 3 | 4 | android { 5 | compileSdkVersion rootProject.ext.compileSdkVersion 6 | 7 | compileOptions { 8 | sourceCompatibility JavaVersion.VERSION_1_8 9 | targetCompatibility JavaVersion.VERSION_1_8 10 | } 11 | defaultConfig { 12 | minSdkVersion rootProject.ext.minSdkVersion 13 | targetSdkVersion rootProject.ext.targetSdkVersion 14 | } 15 | buildTypes { 16 | release { 17 | minifyEnabled false 18 | proguardFiles getDefaultProguardFile('proguard-android.txt'), 'proguard-rules.pro' 19 | } 20 | } 21 | testOptions.unitTests.includeAndroidResources = true 22 | testOptions.unitTests.all { 23 | // unitTests.returnDefaultValues = true 24 | // Always show the result of every unit test, even if it passes. 25 | testLogging { 26 | events 'passed', 'skipped', 'failed', 'standardOut', 'standardError' 27 | } 28 | } 29 | } 30 | 31 | dependencies { 32 | implementation rootProject.ext.rxJava 33 | implementation rootProject.ext.androidXFragment 34 | implementation rootProject.ext.androidXAnnotation 35 | implementation rootProject.ext.androidXAppcompat 36 | 37 | testImplementation 'junit:junit:4.13' 38 | testImplementation rootProject.ext.mockito 39 | testImplementation rootProject.ext.robolectric 40 | testImplementation rootProject.ext.khronosOpenGLApi 41 | } 42 | 43 | // Commented to use JitPack instead of bintray 44 | //apply from: 'install.gradle' 45 | //apply from: 'bintray.gradle' 46 | -------------------------------------------------------------------------------- /lib/install.gradle: -------------------------------------------------------------------------------- 1 | apply plugin: 'com.github.dcendents.android-maven' 2 | 3 | group = publishedGroupId 4 | 5 | install { 6 | repositories.mavenInstaller { 7 | pom { 8 | project { 9 | packaging 'aar' 10 | groupId publishedGroupId 11 | artifactId artifact 12 | 13 | name libraryName 14 | description libraryDescription 15 | url siteUrl 16 | 17 | licenses { 18 | license { 19 | name licenseName 20 | url licenseUrl 21 | } 22 | } 23 | developers { 24 | developer { 25 | id developerId 26 | name developerName 27 | email developerEmail 28 | } 29 | } 30 | scm { 31 | connection gitUrl 32 | developerConnection gitUrl 33 | url siteUrl 34 | 35 | } 36 | } 37 | } 38 | } 39 | } 40 | -------------------------------------------------------------------------------- /lib/jitpack.gradle: -------------------------------------------------------------------------------- 1 | apply plugin: 'com.github.dcendents.android-maven' 2 | 3 | group = 'com.github.tbruyelle' -------------------------------------------------------------------------------- /lib/proguard-rules.pro: -------------------------------------------------------------------------------- 1 | # Add project specific ProGuard rules here. 2 | # By default, the flags in this file are appended to flags specified 3 | # in ${sdk.dir}/tools/proguard/proguard-android.txt 4 | # You can edit the include path and order by changing the proguardFiles 5 | # directive in build.gradle. 6 | # 7 | # For more details, see 8 | # http://developer.android.com/guide/developing/tools/proguard.html 9 | 10 | # Add any project specific keep options here: 11 | 12 | # If your project uses WebView with JS, uncomment the following 13 | # and specify the fully qualified class name to the JavaScript interface 14 | # class: 15 | #-keepclassmembers class fqcn.of.javascript.interface.for.webview { 16 | # public *; 17 | #} 18 | -------------------------------------------------------------------------------- /lib/src/main/AndroidManifest.xml: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | 6 | 7 | -------------------------------------------------------------------------------- /lib/src/main/java/com/tbruyelle/rxpermissions3/Permission.java: -------------------------------------------------------------------------------- 1 | package com.tbruyelle.rxpermissions3; 2 | 3 | import java.util.List; 4 | 5 | import io.reactivex.rxjava3.core.Observable; 6 | import io.reactivex.rxjava3.functions.BiConsumer; 7 | import io.reactivex.rxjava3.functions.Function; 8 | import io.reactivex.rxjava3.functions.Predicate; 9 | 10 | public class Permission { 11 | public final String name; 12 | public final boolean granted; 13 | public final boolean shouldShowRequestPermissionRationale; 14 | 15 | public Permission(String name, boolean granted) { 16 | this(name, granted, false); 17 | } 18 | 19 | public Permission(String name, boolean granted, boolean shouldShowRequestPermissionRationale) { 20 | this.name = name; 21 | this.granted = granted; 22 | this.shouldShowRequestPermissionRationale = shouldShowRequestPermissionRationale; 23 | } 24 | 25 | public Permission(List permissions) { 26 | name = combineName(permissions); 27 | granted = combineGranted(permissions); 28 | shouldShowRequestPermissionRationale = combineShouldShowRequestPermissionRationale(permissions); 29 | } 30 | 31 | @Override 32 | @SuppressWarnings("SimplifiableIfStatement") 33 | public boolean equals(final Object o) { 34 | if (this == o) return true; 35 | if (o == null || getClass() != o.getClass()) return false; 36 | 37 | final Permission that = (Permission) o; 38 | 39 | if (granted != that.granted) return false; 40 | if (shouldShowRequestPermissionRationale != that.shouldShowRequestPermissionRationale) 41 | return false; 42 | return name.equals(that.name); 43 | } 44 | 45 | @Override 46 | public int hashCode() { 47 | int result = name.hashCode(); 48 | result = 31 * result + (granted ? 1 : 0); 49 | result = 31 * result + (shouldShowRequestPermissionRationale ? 1 : 0); 50 | return result; 51 | } 52 | 53 | @Override 54 | public String toString() { 55 | return "Permission{" + 56 | "name='" + name + '\'' + 57 | ", granted=" + granted + 58 | ", shouldShowRequestPermissionRationale=" + shouldShowRequestPermissionRationale + 59 | '}'; 60 | } 61 | 62 | private String combineName(List permissions) { 63 | return Observable.fromIterable(permissions) 64 | .map(new Function() { 65 | @Override 66 | public String apply(Permission permission) throws Exception { 67 | return permission.name; 68 | } 69 | }).collectInto(new StringBuilder(), new BiConsumer() { 70 | @Override 71 | public void accept(StringBuilder s, String s2) throws Exception { 72 | if (s.length() == 0) { 73 | s.append(s2); 74 | } else { 75 | s.append(", ").append(s2); 76 | } 77 | } 78 | }).blockingGet().toString(); 79 | } 80 | 81 | private Boolean combineGranted(List permissions) { 82 | return Observable.fromIterable(permissions) 83 | .all(new Predicate() { 84 | @Override 85 | public boolean test(Permission permission) throws Exception { 86 | return permission.granted; 87 | } 88 | }).blockingGet(); 89 | } 90 | 91 | private Boolean combineShouldShowRequestPermissionRationale(List permissions) { 92 | return Observable.fromIterable(permissions) 93 | .any(new Predicate() { 94 | @Override 95 | public boolean test(Permission permission) throws Exception { 96 | return permission.shouldShowRequestPermissionRationale; 97 | } 98 | }).blockingGet(); 99 | } 100 | } 101 | -------------------------------------------------------------------------------- /lib/src/main/java/com/tbruyelle/rxpermissions3/RxPermissions.java: -------------------------------------------------------------------------------- 1 | /** 2 | * Licensed under the Apache License, Version 2.0 (the "License"); 3 | * you may not use this file except in compliance with the License. 4 | * You may obtain a copy of the License at 5 | *

6 | * http://www.apache.org/licenses/LICENSE-2.0 7 | *

8 | * Unless required by applicable law or agreed to in writing, software 9 | * distributed under the License is distributed on an "AS IS" BASIS, 10 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 11 | * See the License for the specific language governing permissions and 12 | * limitations under the License. 13 | */ 14 | 15 | package com.tbruyelle.rxpermissions3; 16 | 17 | import android.annotation.TargetApi; 18 | import android.app.Activity; 19 | import android.os.Build; 20 | import android.text.TextUtils; 21 | 22 | import androidx.annotation.NonNull; 23 | import androidx.annotation.VisibleForTesting; 24 | import androidx.fragment.app.FragmentActivity; 25 | import androidx.fragment.app.Fragment; 26 | import androidx.fragment.app.FragmentManager; 27 | 28 | import java.util.ArrayList; 29 | import java.util.List; 30 | 31 | import io.reactivex.rxjava3.core.Observable; 32 | import io.reactivex.rxjava3.core.ObservableSource; 33 | import io.reactivex.rxjava3.core.ObservableTransformer; 34 | import io.reactivex.rxjava3.functions.Function; 35 | import io.reactivex.rxjava3.subjects.PublishSubject; 36 | 37 | public class RxPermissions { 38 | 39 | static final String TAG = RxPermissions.class.getSimpleName(); 40 | static final Object TRIGGER = new Object(); 41 | 42 | @VisibleForTesting 43 | Lazy mRxPermissionsFragment; 44 | 45 | public RxPermissions(@NonNull final FragmentActivity activity) { 46 | mRxPermissionsFragment = getLazySingleton(activity.getSupportFragmentManager()); 47 | } 48 | 49 | public RxPermissions(@NonNull final Fragment fragment) { 50 | mRxPermissionsFragment = getLazySingleton(fragment.getChildFragmentManager()); 51 | } 52 | 53 | @NonNull 54 | private Lazy getLazySingleton(@NonNull final FragmentManager fragmentManager) { 55 | return new Lazy() { 56 | 57 | private RxPermissionsFragment rxPermissionsFragment; 58 | 59 | @Override 60 | public synchronized RxPermissionsFragment get() { 61 | if (rxPermissionsFragment == null) { 62 | rxPermissionsFragment = getRxPermissionsFragment(fragmentManager); 63 | } 64 | return rxPermissionsFragment; 65 | } 66 | 67 | }; 68 | } 69 | 70 | private RxPermissionsFragment getRxPermissionsFragment(@NonNull final FragmentManager fragmentManager) { 71 | RxPermissionsFragment rxPermissionsFragment = findRxPermissionsFragment(fragmentManager); 72 | boolean isNewInstance = rxPermissionsFragment == null; 73 | if (isNewInstance) { 74 | rxPermissionsFragment = new RxPermissionsFragment(); 75 | fragmentManager 76 | .beginTransaction() 77 | .add(rxPermissionsFragment, TAG) 78 | .commitNow(); 79 | } 80 | return rxPermissionsFragment; 81 | } 82 | 83 | private RxPermissionsFragment findRxPermissionsFragment(@NonNull final FragmentManager fragmentManager) { 84 | return (RxPermissionsFragment) fragmentManager.findFragmentByTag(TAG); 85 | } 86 | 87 | public void setLogging(boolean logging) { 88 | mRxPermissionsFragment.get().setLogging(logging); 89 | } 90 | 91 | /** 92 | * Map emitted items from the source observable into {@code true} if permissions in parameters 93 | * are granted, or {@code false} if not. 94 | *

95 | * If one or several permissions have never been requested, invoke the related framework method 96 | * to ask the user if he allows the permissions. 97 | */ 98 | @SuppressWarnings("WeakerAccess") 99 | public ObservableTransformer ensure(final String... permissions) { 100 | return new ObservableTransformer() { 101 | @Override 102 | public ObservableSource apply(Observable o) { 103 | return request(o, permissions) 104 | // Transform Observable to Observable 105 | .buffer(permissions.length) 106 | .flatMap(new Function, ObservableSource>() { 107 | @Override 108 | public ObservableSource apply(List permissions) { 109 | if (permissions.isEmpty()) { 110 | // Occurs during orientation change, when the subject receives onComplete. 111 | // In that case we don't want to propagate that empty list to the 112 | // subscriber, only the onComplete. 113 | return Observable.empty(); 114 | } 115 | // Return true if all permissions are granted. 116 | for (Permission p : permissions) { 117 | if (!p.granted) { 118 | return Observable.just(false); 119 | } 120 | } 121 | return Observable.just(true); 122 | } 123 | }); 124 | } 125 | }; 126 | } 127 | 128 | /** 129 | * Map emitted items from the source observable into {@link Permission} objects for each 130 | * permission in parameters. 131 | *

132 | * If one or several permissions have never been requested, invoke the related framework method 133 | * to ask the user if he allows the permissions. 134 | */ 135 | @SuppressWarnings("WeakerAccess") 136 | public ObservableTransformer ensureEach(final String... permissions) { 137 | return new ObservableTransformer() { 138 | @Override 139 | public ObservableSource apply(Observable o) { 140 | return request(o, permissions); 141 | } 142 | }; 143 | } 144 | 145 | /** 146 | * Map emitted items from the source observable into one combined {@link Permission} object. Only if all permissions are granted, 147 | * permission also will be granted. If any permission has {@code shouldShowRationale} checked, than result also has it checked. 148 | *

149 | * If one or several permissions have never been requested, invoke the related framework method 150 | * to ask the user if he allows the permissions. 151 | */ 152 | public ObservableTransformer ensureEachCombined(final String... permissions) { 153 | return new ObservableTransformer() { 154 | @Override 155 | public ObservableSource apply(Observable o) { 156 | return request(o, permissions) 157 | .buffer(permissions.length) 158 | .flatMap(new Function, ObservableSource>() { 159 | @Override 160 | public ObservableSource apply(List permissions) { 161 | if (permissions.isEmpty()) { 162 | return Observable.empty(); 163 | } 164 | return Observable.just(new Permission(permissions)); 165 | } 166 | }); 167 | } 168 | }; 169 | } 170 | 171 | /** 172 | * Request permissions immediately, must be invoked during initialization phase 173 | * of your application. 174 | */ 175 | @SuppressWarnings({"WeakerAccess", "unused"}) 176 | public Observable request(final String... permissions) { 177 | return Observable.just(TRIGGER).compose(ensure(permissions)); 178 | } 179 | 180 | /** 181 | * Request permissions immediately, must be invoked during initialization phase 182 | * of your application. 183 | */ 184 | @SuppressWarnings({"WeakerAccess", "unused"}) 185 | public Observable requestEach(final String... permissions) { 186 | return Observable.just(TRIGGER).compose(ensureEach(permissions)); 187 | } 188 | 189 | /** 190 | * Request permissions immediately, must be invoked during initialization phase 191 | * of your application. 192 | */ 193 | public Observable requestEachCombined(final String... permissions) { 194 | return Observable.just(TRIGGER).compose(ensureEachCombined(permissions)); 195 | } 196 | 197 | private Observable request(final Observable trigger, final String... permissions) { 198 | if (permissions == null || permissions.length == 0) { 199 | throw new IllegalArgumentException("RxPermissions.request/requestEach requires at least one input permission"); 200 | } 201 | return trigger.flatMap( o -> requestImplementation(permissions)); 202 | } 203 | 204 | @TargetApi(Build.VERSION_CODES.M) 205 | private Observable requestImplementation(final String... permissions) { 206 | List> list = new ArrayList<>(permissions.length); 207 | List unrequestedPermissions = new ArrayList<>(); 208 | 209 | // In case of multiple permissions, we create an Observable for each of them. 210 | // At the end, the observables are combined to have a unique response. 211 | for (String permission : permissions) { 212 | mRxPermissionsFragment.get().log("Requesting permission " + permission); 213 | if (isGranted(permission)) { 214 | // Already granted, or not Android M 215 | // Return a granted Permission object. 216 | list.add(Observable.just(new Permission(permission, true, false))); 217 | continue; 218 | } 219 | 220 | if (isRevoked(permission)) { 221 | // Revoked by a policy, return a denied Permission object. 222 | list.add(Observable.just(new Permission(permission, false, false))); 223 | continue; 224 | } 225 | 226 | PublishSubject subject = mRxPermissionsFragment.get().getSubjectByPermission(permission); 227 | // Create a new subject if not exists 228 | if (subject == null) { 229 | unrequestedPermissions.add(permission); 230 | subject = PublishSubject.create(); 231 | mRxPermissionsFragment.get().setSubjectForPermission(permission, subject); 232 | } 233 | 234 | list.add(subject); 235 | } 236 | 237 | if (!unrequestedPermissions.isEmpty()) { 238 | String[] unrequestedPermissionsArray = unrequestedPermissions.toArray(new String[unrequestedPermissions.size()]); 239 | requestPermissionsFromFragment(unrequestedPermissionsArray); 240 | } 241 | return Observable.concat(Observable.fromIterable(list)); 242 | } 243 | 244 | /** 245 | * Invokes Activity.shouldShowRequestPermissionRationale and wraps 246 | * the returned value in an observable. 247 | *

248 | * In case of multiple permissions, only emits true if 249 | * Activity.shouldShowRequestPermissionRationale returned true for 250 | * all revoked permissions. 251 | *

252 | * You shouldn't call this method if all permissions have been granted. 253 | *

254 | * For SDK < 23, the observable will always emit false. 255 | */ 256 | @SuppressWarnings("WeakerAccess") 257 | public Observable shouldShowRequestPermissionRationale(final Activity activity, final String... permissions) { 258 | if (!isMarshmallow()) { 259 | return Observable.just(false); 260 | } 261 | return Observable.just(shouldShowRequestPermissionRationaleImplementation(activity, permissions)); 262 | } 263 | 264 | @TargetApi(Build.VERSION_CODES.M) 265 | private boolean shouldShowRequestPermissionRationaleImplementation(final Activity activity, final String... permissions) { 266 | for (String p : permissions) { 267 | if (!isGranted(p) && !activity.shouldShowRequestPermissionRationale(p)) { 268 | return false; 269 | } 270 | } 271 | return true; 272 | } 273 | 274 | @TargetApi(Build.VERSION_CODES.M) 275 | void requestPermissionsFromFragment(String[] permissions) { 276 | mRxPermissionsFragment.get().log("requestPermissionsFromFragment " + TextUtils.join(", ", permissions)); 277 | mRxPermissionsFragment.get().requestPermissions(permissions); 278 | } 279 | 280 | /** 281 | * Returns true if the permission is already granted. 282 | *

283 | * Always true if SDK < 23. 284 | */ 285 | @SuppressWarnings("WeakerAccess") 286 | public boolean isGranted(String permission) { 287 | return !isMarshmallow() || mRxPermissionsFragment.get().isGranted(permission); 288 | } 289 | 290 | /** 291 | * Returns true if the permission has been revoked by a policy. 292 | *

293 | * Always false if SDK < 23. 294 | */ 295 | @SuppressWarnings("WeakerAccess") 296 | public boolean isRevoked(String permission) { 297 | return isMarshmallow() && mRxPermissionsFragment.get().isRevoked(permission); 298 | } 299 | 300 | boolean isMarshmallow() { 301 | return Build.VERSION.SDK_INT >= Build.VERSION_CODES.M; 302 | } 303 | 304 | void onRequestPermissionsResult(String[] permissions, int[] grantResults) { 305 | mRxPermissionsFragment.get().onRequestPermissionsResult(permissions, grantResults, new boolean[permissions.length]); 306 | } 307 | 308 | @FunctionalInterface 309 | public interface Lazy { 310 | V get(); 311 | } 312 | 313 | } 314 | -------------------------------------------------------------------------------- /lib/src/main/java/com/tbruyelle/rxpermissions3/RxPermissionsFragment.java: -------------------------------------------------------------------------------- 1 | package com.tbruyelle.rxpermissions3; 2 | 3 | import android.annotation.TargetApi; 4 | import android.content.pm.PackageManager; 5 | import android.os.Build; 6 | import android.os.Bundle; 7 | import android.util.Log; 8 | 9 | import androidx.annotation.NonNull; 10 | import androidx.fragment.app.Fragment; 11 | import androidx.fragment.app.FragmentActivity; 12 | 13 | import java.util.HashMap; 14 | import java.util.Map; 15 | 16 | import io.reactivex.rxjava3.subjects.PublishSubject; 17 | 18 | 19 | public class RxPermissionsFragment extends Fragment { 20 | 21 | private static final int PERMISSIONS_REQUEST_CODE = 42; 22 | 23 | // Contains all the current permission requests. 24 | // Once granted or denied, they are removed from it. 25 | private Map> mSubjects = new HashMap<>(); 26 | private boolean mLogging; 27 | 28 | public RxPermissionsFragment() { 29 | } 30 | 31 | @Override 32 | public void onCreate(Bundle savedInstanceState) { 33 | super.onCreate(savedInstanceState); 34 | setRetainInstance(true); 35 | } 36 | 37 | @TargetApi(Build.VERSION_CODES.M) 38 | void requestPermissions(@NonNull String[] permissions) { 39 | requestPermissions(permissions, PERMISSIONS_REQUEST_CODE); 40 | } 41 | 42 | @TargetApi(Build.VERSION_CODES.M) 43 | public void onRequestPermissionsResult(int requestCode, @NonNull String[] permissions, @NonNull int[] grantResults) { 44 | super.onRequestPermissionsResult(requestCode, permissions, grantResults); 45 | 46 | if (requestCode != PERMISSIONS_REQUEST_CODE) return; 47 | 48 | boolean[] shouldShowRequestPermissionRationale = new boolean[permissions.length]; 49 | 50 | for (int i = 0; i < permissions.length; i++) { 51 | shouldShowRequestPermissionRationale[i] = shouldShowRequestPermissionRationale(permissions[i]); 52 | } 53 | 54 | onRequestPermissionsResult(permissions, grantResults, shouldShowRequestPermissionRationale); 55 | } 56 | 57 | void onRequestPermissionsResult(String[] permissions, int[] grantResults, boolean[] shouldShowRequestPermissionRationale) { 58 | for (int i = 0, size = permissions.length; i < size; i++) { 59 | log("onRequestPermissionsResult " + permissions[i]); 60 | // Find the corresponding subject 61 | PublishSubject subject = mSubjects.get(permissions[i]); 62 | if (subject == null) { 63 | // No subject found 64 | Log.e(RxPermissions.TAG, "RxPermissions.onRequestPermissionsResult invoked but didn't find the corresponding permission request."); 65 | return; 66 | } 67 | mSubjects.remove(permissions[i]); 68 | boolean granted = grantResults[i] == PackageManager.PERMISSION_GRANTED; 69 | subject.onNext(new Permission(permissions[i], granted, shouldShowRequestPermissionRationale[i])); 70 | subject.onComplete(); 71 | } 72 | } 73 | 74 | @TargetApi(Build.VERSION_CODES.M) 75 | boolean isGranted(String permission) { 76 | final FragmentActivity fragmentActivity = getActivity(); 77 | if (fragmentActivity == null) { 78 | throw new IllegalStateException("This fragment must be attached to an activity."); 79 | } 80 | return fragmentActivity.checkSelfPermission(permission) == PackageManager.PERMISSION_GRANTED; 81 | } 82 | 83 | @TargetApi(Build.VERSION_CODES.M) 84 | boolean isRevoked(String permission) { 85 | final FragmentActivity fragmentActivity = getActivity(); 86 | if (fragmentActivity == null) { 87 | throw new IllegalStateException("This fragment must be attached to an activity."); 88 | } 89 | return fragmentActivity.getPackageManager().isPermissionRevokedByPolicy(permission, getActivity().getPackageName()); 90 | } 91 | 92 | public void setLogging(boolean logging) { 93 | mLogging = logging; 94 | } 95 | 96 | public PublishSubject getSubjectByPermission(@NonNull String permission) { 97 | return mSubjects.get(permission); 98 | } 99 | 100 | public void setSubjectForPermission(@NonNull String permission, @NonNull PublishSubject subject) { 101 | mSubjects.put(permission, subject); 102 | } 103 | 104 | void log(String message) { 105 | if (mLogging) { 106 | Log.d(RxPermissions.TAG, message); 107 | } 108 | } 109 | 110 | } 111 | -------------------------------------------------------------------------------- /lib/src/test/java/com/tbruyelle/rxpermissions3/RxPermissionsTest.java: -------------------------------------------------------------------------------- 1 | /** 2 | * Licensed under the Apache License, Version 2.0 (the "License"); 3 | * you may not use this file except in compliance with the License. 4 | * You may obtain a copy of the License at 5 | *

6 | * http://www.apache.org/licenses/LICENSE-2.0 7 | *

8 | * Unless required by applicable law or agreed to in writing, software 9 | * distributed under the License is distributed on an "AS IS" BASIS, 10 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 11 | * See the License for the specific language governing permissions and 12 | * limitations under the License. 13 | */ 14 | 15 | package com.tbruyelle.rxpermissions3; 16 | 17 | import android.Manifest; 18 | import android.annotation.TargetApi; 19 | import android.app.Activity; 20 | import android.content.pm.PackageManager; 21 | import android.os.Build; 22 | 23 | import androidx.fragment.app.FragmentActivity; 24 | 25 | import org.junit.Before; 26 | import org.junit.Test; 27 | import org.junit.runner.RunWith; 28 | import org.mockito.ArgumentCaptor; 29 | import org.mockito.ArgumentMatchers; 30 | import org.robolectric.Robolectric; 31 | import org.robolectric.RobolectricTestRunner; 32 | import org.robolectric.android.controller.ActivityController; 33 | import org.robolectric.annotation.Config; 34 | 35 | 36 | import io.reactivex.rxjava3.core.Observable; 37 | import io.reactivex.rxjava3.observers.TestObserver; 38 | import io.reactivex.rxjava3.subjects.PublishSubject; 39 | 40 | import static org.junit.Assert.assertEquals; 41 | import static org.junit.Assert.assertFalse; 42 | import static org.junit.Assert.assertTrue; 43 | import static org.mockito.Matchers.anyString; 44 | import static org.mockito.Matchers.eq; 45 | import static org.mockito.Mockito.doCallRealMethod; 46 | import static org.mockito.Mockito.doReturn; 47 | import static org.mockito.Mockito.mock; 48 | import static org.mockito.Mockito.spy; 49 | import static org.mockito.Mockito.verify; 50 | import static org.mockito.Mockito.when; 51 | 52 | @RunWith(RobolectricTestRunner.class) 53 | @Config(sdk = Build.VERSION_CODES.M) 54 | public class RxPermissionsTest { 55 | 56 | private FragmentActivity mActivity; 57 | 58 | private RxPermissions mRxPermissions; 59 | 60 | @Before 61 | public void setup() { 62 | ActivityController activityController = Robolectric.buildActivity(FragmentActivity.class); 63 | mActivity = spy(activityController.setup().get()); 64 | mRxPermissions = spy(new RxPermissions(mActivity)); 65 | mRxPermissions.mRxPermissionsFragment = spy(mRxPermissions.mRxPermissionsFragment); 66 | final RxPermissionsFragment rxPermissionsFragment = spy(mRxPermissions.mRxPermissionsFragment.get()); 67 | when(rxPermissionsFragment.getActivity()).thenReturn(mActivity); 68 | when(mRxPermissions.mRxPermissionsFragment.get()).thenReturn(rxPermissionsFragment); 69 | // Default deny all permissions 70 | doReturn(false).when(mRxPermissions).isGranted(anyString()); 71 | // Default no revoked permissions 72 | doReturn(false).when(mRxPermissions).isRevoked(anyString()); 73 | } 74 | 75 | private Observable trigger() { 76 | return Observable.just(RxPermissions.TRIGGER); 77 | } 78 | 79 | @Test 80 | @TargetApi(Build.VERSION_CODES.M) 81 | public void subscription_preM() { 82 | TestObserver sub = new TestObserver<>(); 83 | String permission = Manifest.permission.READ_PHONE_STATE; 84 | when(mRxPermissions.isGranted(permission)).thenReturn(true); 85 | 86 | trigger().compose(mRxPermissions.ensure(permission)).subscribe(sub); 87 | 88 | sub.assertNoErrors(); 89 | sub.assertValue(true); 90 | } 91 | 92 | @Test 93 | @TargetApi(Build.VERSION_CODES.M) 94 | public void subscription_granted() { 95 | TestObserver sub = new TestObserver<>(); 96 | String permission = Manifest.permission.READ_PHONE_STATE; 97 | when(mRxPermissions.isGranted(permission)).thenReturn(false); 98 | int[] result = new int[]{PackageManager.PERMISSION_GRANTED}; 99 | 100 | trigger().compose(mRxPermissions.ensure(permission)).subscribe(sub); 101 | mRxPermissions.onRequestPermissionsResult(new String[]{permission}, result); 102 | 103 | sub.assertNoErrors(); 104 | sub.assertValue(true); 105 | } 106 | 107 | @Test 108 | @TargetApi(Build.VERSION_CODES.M) 109 | public void eachSubscription_granted() { 110 | TestObserver sub = new TestObserver<>(); 111 | String permission = Manifest.permission.READ_PHONE_STATE; 112 | when(mRxPermissions.isGranted(permission)).thenReturn(false); 113 | int[] result = new int[]{PackageManager.PERMISSION_GRANTED}; 114 | 115 | trigger().compose(mRxPermissions.ensureEach(permission)).subscribe(sub); 116 | mRxPermissions.onRequestPermissionsResult(new String[]{permission}, result); 117 | 118 | sub.assertNoErrors(); 119 | sub.assertValue(new Permission(permission, true)); 120 | } 121 | 122 | @Test 123 | @TargetApi(Build.VERSION_CODES.M) 124 | public void eachSubscriptionCombined_granted() { 125 | TestObserver sub = new TestObserver<>(); 126 | String permission = Manifest.permission.READ_PHONE_STATE; 127 | when(mRxPermissions.isGranted(permission)).thenReturn(false); 128 | int[] result = new int[]{PackageManager.PERMISSION_GRANTED}; 129 | 130 | trigger().compose(mRxPermissions.ensureEachCombined(permission)).subscribe(sub); 131 | mRxPermissions.onRequestPermissionsResult(new String[]{permission}, result); 132 | 133 | sub.assertNoErrors(); 134 | sub.assertValue(new Permission(permission, true)); 135 | } 136 | 137 | @Test 138 | @TargetApi(Build.VERSION_CODES.M) 139 | public void eachSubscription_preM() { 140 | TestObserver sub = new TestObserver<>(); 141 | String permission = Manifest.permission.READ_PHONE_STATE; 142 | when(mRxPermissions.isGranted(permission)).thenReturn(true); 143 | 144 | trigger().compose(mRxPermissions.ensureEach(permission)).subscribe(sub); 145 | 146 | sub.assertNoErrors(); 147 | sub.assertValue(new Permission(permission, true)); 148 | } 149 | 150 | @Test 151 | @TargetApi(Build.VERSION_CODES.M) 152 | public void eachSubscriptionCombined_preM() { 153 | TestObserver sub = new TestObserver<>(); 154 | String permission = Manifest.permission.READ_PHONE_STATE; 155 | when(mRxPermissions.isGranted(permission)).thenReturn(true); 156 | 157 | trigger().compose(mRxPermissions.ensureEachCombined(permission)).subscribe(sub); 158 | 159 | sub.assertNoErrors(); 160 | sub.assertValue(new Permission(permission, true)); 161 | } 162 | 163 | @Test 164 | @TargetApi(Build.VERSION_CODES.M) 165 | public void subscription_alreadyGranted() { 166 | TestObserver sub = new TestObserver<>(); 167 | String permission = Manifest.permission.READ_PHONE_STATE; 168 | when(mRxPermissions.isGranted(permission)).thenReturn(true); 169 | 170 | trigger().compose(mRxPermissions.ensure(permission)).subscribe(sub); 171 | 172 | sub.assertNoErrors(); 173 | sub.assertValue(true); 174 | } 175 | 176 | @Test 177 | @TargetApi(Build.VERSION_CODES.M) 178 | public void subscription_denied() { 179 | TestObserver sub = new TestObserver<>(); 180 | String permission = Manifest.permission.READ_PHONE_STATE; 181 | when(mRxPermissions.isGranted(permission)).thenReturn(false); 182 | int[] result = new int[]{PackageManager.PERMISSION_DENIED}; 183 | 184 | trigger().compose(mRxPermissions.ensure(permission)).subscribe(sub); 185 | mRxPermissions.onRequestPermissionsResult(new String[]{permission}, result); 186 | 187 | sub.assertNoErrors(); 188 | sub.assertValue(false); 189 | } 190 | 191 | @Test 192 | @TargetApi(Build.VERSION_CODES.M) 193 | public void eachSubscription_denied() { 194 | TestObserver sub = new TestObserver<>(); 195 | String permission = Manifest.permission.READ_PHONE_STATE; 196 | when(mRxPermissions.isGranted(permission)).thenReturn(false); 197 | int[] result = new int[]{PackageManager.PERMISSION_DENIED}; 198 | 199 | trigger().compose(mRxPermissions.ensureEach(permission)).subscribe(sub); 200 | mRxPermissions.onRequestPermissionsResult(new String[]{permission}, result); 201 | 202 | sub.assertNoErrors(); 203 | sub.assertValue(new Permission(permission, false)); 204 | } 205 | 206 | @Test 207 | @TargetApi(Build.VERSION_CODES.M) 208 | public void eachSubscriptionCombined_denied() { 209 | TestObserver sub = new TestObserver<>(); 210 | String permission = Manifest.permission.READ_PHONE_STATE; 211 | when(mRxPermissions.isGranted(permission)).thenReturn(false); 212 | int[] result = new int[]{PackageManager.PERMISSION_DENIED}; 213 | 214 | trigger().compose(mRxPermissions.ensureEachCombined(permission)).subscribe(sub); 215 | mRxPermissions.onRequestPermissionsResult(new String[]{permission}, result); 216 | 217 | sub.assertNoErrors(); 218 | sub.assertValue(new Permission(permission, false)); 219 | } 220 | 221 | @Test 222 | @TargetApi(Build.VERSION_CODES.M) 223 | public void subscription_revoked() { 224 | TestObserver sub = new TestObserver<>(); 225 | String permission = Manifest.permission.READ_PHONE_STATE; 226 | when(mRxPermissions.isRevoked(permission)).thenReturn(true); 227 | 228 | trigger().compose(mRxPermissions.ensure(permission)).subscribe(sub); 229 | 230 | sub.assertNoErrors(); 231 | sub.assertValue(false); 232 | } 233 | 234 | @Test 235 | @TargetApi(Build.VERSION_CODES.M) 236 | public void eachSubscription_revoked() { 237 | TestObserver sub = new TestObserver<>(); 238 | String permission = Manifest.permission.READ_PHONE_STATE; 239 | when(mRxPermissions.isRevoked(permission)).thenReturn(true); 240 | 241 | trigger().compose(mRxPermissions.ensureEach(permission)).subscribe(sub); 242 | 243 | sub.assertNoErrors(); 244 | sub.assertValue(new Permission(permission, false)); 245 | } 246 | 247 | @Test 248 | @TargetApi(Build.VERSION_CODES.M) 249 | public void eachSubscriptionCombined_revoked() { 250 | TestObserver sub = new TestObserver<>(); 251 | String permission = Manifest.permission.READ_PHONE_STATE; 252 | when(mRxPermissions.isRevoked(permission)).thenReturn(true); 253 | 254 | trigger().compose(mRxPermissions.ensureEachCombined(permission)).subscribe(sub); 255 | 256 | sub.assertNoErrors(); 257 | sub.assertValue(new Permission(permission, false)); 258 | } 259 | 260 | @Test 261 | @TargetApi(Build.VERSION_CODES.M) 262 | public void subscription_severalPermissions_granted() { 263 | TestObserver sub = new TestObserver<>(); 264 | String[] permissions = new String[]{Manifest.permission.READ_PHONE_STATE, Manifest.permission.CAMERA}; 265 | when(mRxPermissions.isGranted(ArgumentMatchers.anyString())).thenReturn(false); 266 | int[] result = new int[]{PackageManager.PERMISSION_GRANTED, PackageManager.PERMISSION_GRANTED}; 267 | 268 | trigger().compose(mRxPermissions.ensure(permissions)).subscribe(sub); 269 | mRxPermissions.onRequestPermissionsResult(permissions, result); 270 | 271 | sub.assertNoErrors(); 272 | sub.assertValue(true); 273 | } 274 | 275 | @Test 276 | @TargetApi(Build.VERSION_CODES.M) 277 | public void eachSubscription_severalPermissions_granted() { 278 | TestObserver sub = new TestObserver<>(); 279 | String[] permissions = new String[]{Manifest.permission.READ_PHONE_STATE, Manifest.permission.CAMERA}; 280 | when(mRxPermissions.isGranted(ArgumentMatchers.anyString())).thenReturn(false); 281 | int[] result = new int[]{PackageManager.PERMISSION_GRANTED, PackageManager.PERMISSION_GRANTED}; 282 | 283 | trigger().compose(mRxPermissions.ensureEach(permissions)).subscribe(sub); 284 | mRxPermissions.onRequestPermissionsResult(permissions, result); 285 | 286 | sub.assertNoErrors(); 287 | sub.assertValues(new Permission(permissions[0], true), new Permission(permissions[1], true)); 288 | } 289 | 290 | @Test 291 | @TargetApi(Build.VERSION_CODES.M) 292 | public void eachSubscriptionCombined_severalPermissions_granted() { 293 | TestObserver sub = new TestObserver<>(); 294 | String[] permissions = new String[]{Manifest.permission.READ_PHONE_STATE, Manifest.permission.CAMERA}; 295 | when(mRxPermissions.isGranted(ArgumentMatchers.anyString())).thenReturn(false); 296 | int[] result = new int[]{PackageManager.PERMISSION_GRANTED, PackageManager.PERMISSION_GRANTED}; 297 | 298 | trigger().compose(mRxPermissions.ensureEachCombined(permissions)).subscribe(sub); 299 | mRxPermissions.onRequestPermissionsResult(permissions, result); 300 | 301 | sub.assertNoErrors(); 302 | sub.assertValues(new Permission(permissions[0] + ", " + permissions[1], true)); 303 | } 304 | 305 | @Test 306 | @TargetApi(Build.VERSION_CODES.M) 307 | public void subscription_severalPermissions_oneDenied() { 308 | TestObserver sub = new TestObserver<>(); 309 | String[] permissions = new String[]{Manifest.permission.READ_PHONE_STATE, Manifest.permission.CAMERA}; 310 | when(mRxPermissions.isGranted(ArgumentMatchers.anyString())).thenReturn(false); 311 | int[] result = new int[]{PackageManager.PERMISSION_GRANTED, PackageManager.PERMISSION_DENIED}; 312 | 313 | trigger().compose(mRxPermissions.ensure(permissions)).subscribe(sub); 314 | mRxPermissions.onRequestPermissionsResult(permissions, result); 315 | 316 | sub.assertNoErrors(); 317 | sub.assertValue(false); 318 | } 319 | 320 | @Test 321 | @TargetApi(Build.VERSION_CODES.M) 322 | public void subscription_severalPermissions_oneRevoked() { 323 | TestObserver sub = new TestObserver<>(); 324 | String[] permissions = new String[]{Manifest.permission.READ_PHONE_STATE, Manifest.permission.CAMERA}; 325 | when(mRxPermissions.isGranted(ArgumentMatchers.anyString())).thenReturn(false); 326 | when(mRxPermissions.isRevoked(Manifest.permission.CAMERA)).thenReturn(true); 327 | 328 | trigger().compose(mRxPermissions.ensure(permissions)).subscribe(sub); 329 | mRxPermissions.onRequestPermissionsResult( 330 | new String[]{Manifest.permission.READ_PHONE_STATE}, 331 | new int[]{PackageManager.PERMISSION_GRANTED}); 332 | 333 | sub.assertNoErrors(); 334 | sub.assertValue(false); 335 | } 336 | 337 | @Test 338 | @TargetApi(Build.VERSION_CODES.M) 339 | public void eachSubscription_severalPermissions_oneAlreadyGranted() { 340 | TestObserver sub = new TestObserver<>(); 341 | String[] permissions = new String[]{Manifest.permission.READ_PHONE_STATE, Manifest.permission.CAMERA}; 342 | when(mRxPermissions.isGranted(ArgumentMatchers.anyString())).thenReturn(false); 343 | when(mRxPermissions.isGranted(Manifest.permission.CAMERA)).thenReturn(true); 344 | 345 | trigger().compose(mRxPermissions.ensureEach(permissions)).subscribe(sub); 346 | mRxPermissions.onRequestPermissionsResult( 347 | new String[]{Manifest.permission.READ_PHONE_STATE}, 348 | new int[]{PackageManager.PERMISSION_GRANTED}); 349 | 350 | sub.assertNoErrors(); 351 | sub.assertValues(new Permission(permissions[0], true), new Permission(permissions[1], true)); 352 | ArgumentCaptor requestedPermissions = ArgumentCaptor.forClass(String[].class); 353 | verify(mRxPermissions).requestPermissionsFromFragment(requestedPermissions.capture()); 354 | assertEquals(1, requestedPermissions.getValue().length); 355 | assertEquals(Manifest.permission.READ_PHONE_STATE, requestedPermissions.getValue()[0]); 356 | } 357 | 358 | @Test 359 | @TargetApi(Build.VERSION_CODES.M) 360 | public void eachSubscriptionCombined_severalPermissions_oneAlreadyGranted() { 361 | TestObserver sub = new TestObserver<>(); 362 | String[] permissions = new String[]{Manifest.permission.READ_PHONE_STATE, Manifest.permission.CAMERA}; 363 | when(mRxPermissions.isGranted(ArgumentMatchers.anyString())).thenReturn(false); 364 | when(mRxPermissions.isGranted(Manifest.permission.CAMERA)).thenReturn(true); 365 | 366 | trigger().compose(mRxPermissions.ensureEachCombined(permissions)).subscribe(sub); 367 | mRxPermissions.onRequestPermissionsResult( 368 | new String[]{Manifest.permission.READ_PHONE_STATE}, 369 | new int[]{PackageManager.PERMISSION_GRANTED}); 370 | 371 | sub.assertNoErrors(); 372 | sub.assertValues(new Permission(permissions[0] + ", " + permissions[1], true)); 373 | ArgumentCaptor requestedPermissions = ArgumentCaptor.forClass(String[].class); 374 | verify(mRxPermissions).requestPermissionsFromFragment(requestedPermissions.capture()); 375 | assertEquals(1, requestedPermissions.getValue().length); 376 | assertEquals(Manifest.permission.READ_PHONE_STATE, requestedPermissions.getValue()[0]); 377 | } 378 | 379 | @Test 380 | @TargetApi(Build.VERSION_CODES.M) 381 | public void eachSubscription_severalPermissions_oneDenied() { 382 | TestObserver sub = new TestObserver<>(); 383 | String[] permissions = new String[]{Manifest.permission.READ_PHONE_STATE, Manifest.permission.CAMERA}; 384 | when(mRxPermissions.isGranted(ArgumentMatchers.anyString())).thenReturn(false); 385 | int[] result = new int[]{PackageManager.PERMISSION_GRANTED, PackageManager.PERMISSION_DENIED}; 386 | 387 | trigger().compose(mRxPermissions.ensureEach(permissions)).subscribe(sub); 388 | mRxPermissions.onRequestPermissionsResult(permissions, result); 389 | 390 | sub.assertNoErrors(); 391 | sub.assertValues(new Permission(permissions[0], true), new Permission(permissions[1], false)); 392 | } 393 | 394 | @Test 395 | @TargetApi(Build.VERSION_CODES.M) 396 | public void eachSubscriptionCombined_severalPermissions_oneDenied() { 397 | TestObserver sub = new TestObserver<>(); 398 | String[] permissions = new String[]{Manifest.permission.READ_PHONE_STATE, Manifest.permission.CAMERA}; 399 | when(mRxPermissions.isGranted(ArgumentMatchers.anyString())).thenReturn(false); 400 | int[] result = new int[]{PackageManager.PERMISSION_GRANTED, PackageManager.PERMISSION_DENIED}; 401 | 402 | trigger().compose(mRxPermissions.ensureEachCombined(permissions)).subscribe(sub); 403 | mRxPermissions.onRequestPermissionsResult(permissions, result); 404 | 405 | sub.assertNoErrors(); 406 | sub.assertValues(new Permission(permissions[0] + ", " + permissions[1], false)); 407 | } 408 | 409 | @Test 410 | @TargetApi(Build.VERSION_CODES.M) 411 | public void eachSubscription_severalPermissions_oneRevoked() { 412 | TestObserver sub = new TestObserver<>(); 413 | String[] permissions = new String[]{Manifest.permission.READ_PHONE_STATE, Manifest.permission.CAMERA}; 414 | when(mRxPermissions.isGranted(ArgumentMatchers.anyString())).thenReturn(false); 415 | when(mRxPermissions.isRevoked(Manifest.permission.CAMERA)).thenReturn(true); 416 | 417 | trigger().compose(mRxPermissions.ensureEach(permissions)).subscribe(sub); 418 | mRxPermissions.onRequestPermissionsResult( 419 | new String[]{Manifest.permission.READ_PHONE_STATE}, 420 | new int[]{PackageManager.PERMISSION_GRANTED}); 421 | 422 | sub.assertNoErrors(); 423 | sub.assertValues(new Permission(permissions[0], true), new Permission(permissions[1], false)); 424 | } 425 | 426 | @Test 427 | @TargetApi(Build.VERSION_CODES.M) 428 | public void eachSubscriptionCombined_severalPermissions_oneRevoked() { 429 | TestObserver sub = new TestObserver<>(); 430 | String[] permissions = new String[]{Manifest.permission.READ_PHONE_STATE, Manifest.permission.CAMERA}; 431 | when(mRxPermissions.isGranted(ArgumentMatchers.anyString())).thenReturn(false); 432 | when(mRxPermissions.isRevoked(Manifest.permission.CAMERA)).thenReturn(true); 433 | 434 | trigger().compose(mRxPermissions.ensureEachCombined(permissions)).subscribe(sub); 435 | mRxPermissions.onRequestPermissionsResult( 436 | new String[]{Manifest.permission.READ_PHONE_STATE}, 437 | new int[]{PackageManager.PERMISSION_GRANTED}); 438 | 439 | sub.assertNoErrors(); 440 | sub.assertValues(new Permission(permissions[0] + ", " + permissions[1], false)); 441 | } 442 | 443 | @Test 444 | @TargetApi(Build.VERSION_CODES.M) 445 | public void subscription_trigger_granted() { 446 | TestObserver sub = new TestObserver<>(); 447 | String permission = Manifest.permission.READ_PHONE_STATE; 448 | when(mRxPermissions.isGranted(permission)).thenReturn(false); 449 | int[] result = new int[]{PackageManager.PERMISSION_GRANTED}; 450 | PublishSubject trigger = PublishSubject.create(); 451 | 452 | trigger.compose(mRxPermissions.ensure(permission)).subscribe(sub); 453 | trigger.onNext(1); 454 | mRxPermissions.onRequestPermissionsResult(new String[]{permission}, result); 455 | 456 | sub.assertNoErrors(); 457 | sub.assertValue(true); 458 | } 459 | 460 | @Test 461 | @TargetApi(Build.VERSION_CODES.M) 462 | public void eachSubscription_trigger_granted() { 463 | TestObserver sub = new TestObserver<>(); 464 | String permission = Manifest.permission.READ_PHONE_STATE; 465 | when(mRxPermissions.isGranted(permission)).thenReturn(false); 466 | int[] result = new int[]{PackageManager.PERMISSION_GRANTED}; 467 | PublishSubject trigger = PublishSubject.create(); 468 | 469 | trigger.compose(mRxPermissions.ensureEach(permission)).subscribe(sub); 470 | trigger.onNext(1); 471 | mRxPermissions.onRequestPermissionsResult(new String[]{permission}, result); 472 | 473 | sub.assertNoErrors(); 474 | sub.assertValue(new Permission(permission, true)); 475 | } 476 | 477 | @Test 478 | @TargetApi(Build.VERSION_CODES.M) 479 | public void eachSubscriptionCombined_trigger_granted() { 480 | TestObserver sub = new TestObserver<>(); 481 | String permission = Manifest.permission.READ_PHONE_STATE; 482 | when(mRxPermissions.isGranted(permission)).thenReturn(false); 483 | int[] result = new int[]{PackageManager.PERMISSION_GRANTED}; 484 | PublishSubject trigger = PublishSubject.create(); 485 | 486 | trigger.compose(mRxPermissions.ensureEachCombined(permission)).subscribe(sub); 487 | trigger.onNext(1); 488 | mRxPermissions.onRequestPermissionsResult(new String[]{permission}, result); 489 | 490 | sub.assertNoErrors(); 491 | sub.assertValue(new Permission(permission, true)); 492 | } 493 | 494 | @Test 495 | @TargetApi(Build.VERSION_CODES.M) 496 | public void shouldShowRequestPermissionRationale_allDenied_allRationale() { 497 | when(mRxPermissions.isMarshmallow()).thenReturn(true); 498 | Activity activity = mock(Activity.class); 499 | when(activity.shouldShowRequestPermissionRationale(anyString())).thenReturn(true); 500 | 501 | TestObserver sub = new TestObserver<>(); 502 | mRxPermissions.shouldShowRequestPermissionRationale(activity, "p1", "p2") 503 | .subscribe(sub); 504 | 505 | sub.assertComplete(); 506 | sub.assertNoErrors(); 507 | sub.assertValue(true); 508 | } 509 | 510 | @Test 511 | @TargetApi(Build.VERSION_CODES.M) 512 | public void shouldShowRequestPermissionRationale_allDenied_oneRationale() { 513 | when(mRxPermissions.isMarshmallow()).thenReturn(true); 514 | Activity activity = mock(Activity.class); 515 | when(activity.shouldShowRequestPermissionRationale("p1")).thenReturn(true); 516 | 517 | TestObserver sub = new TestObserver<>(); 518 | mRxPermissions.shouldShowRequestPermissionRationale(activity, "p1", "p2") 519 | .subscribe(sub); 520 | 521 | sub.assertComplete(); 522 | sub.assertNoErrors(); 523 | sub.assertValue(false); 524 | } 525 | 526 | @Test 527 | @TargetApi(Build.VERSION_CODES.M) 528 | public void shouldShowRequestPermissionRationale_allDenied_noRationale() { 529 | when(mRxPermissions.isMarshmallow()).thenReturn(true); 530 | Activity activity = mock(Activity.class); 531 | 532 | TestObserver sub = new TestObserver<>(); 533 | mRxPermissions.shouldShowRequestPermissionRationale(activity, "p1", "p2") 534 | .subscribe(sub); 535 | 536 | sub.assertComplete(); 537 | sub.assertNoErrors(); 538 | sub.assertValue(false); 539 | } 540 | 541 | @Test 542 | @TargetApi(Build.VERSION_CODES.M) 543 | public void shouldShowRequestPermissionRationale_oneDeniedRationale() { 544 | when(mRxPermissions.isMarshmallow()).thenReturn(true); 545 | Activity activity = mock(Activity.class); 546 | when(mRxPermissions.isGranted("p1")).thenReturn(true); 547 | when(activity.shouldShowRequestPermissionRationale("p2")).thenReturn(true); 548 | 549 | TestObserver sub = new TestObserver<>(); 550 | mRxPermissions.shouldShowRequestPermissionRationale(activity, "p1", "p2") 551 | .subscribe(sub); 552 | 553 | sub.assertComplete(); 554 | sub.assertNoErrors(); 555 | sub.assertValue(true); 556 | } 557 | 558 | @Test 559 | @TargetApi(Build.VERSION_CODES.M) 560 | public void shouldShowRequestPermissionRationale_oneDeniedNotRationale() { 561 | when(mRxPermissions.isMarshmallow()).thenReturn(true); 562 | Activity activity = mock(Activity.class); 563 | when(mRxPermissions.isGranted("p2")).thenReturn(true); 564 | 565 | TestObserver sub = new TestObserver<>(); 566 | mRxPermissions.shouldShowRequestPermissionRationale(activity, "p1", "p2") 567 | .subscribe(sub); 568 | 569 | sub.assertComplete(); 570 | sub.assertNoErrors(); 571 | sub.assertValue(false); 572 | } 573 | 574 | @Test 575 | public void isGranted_preMarshmallow() { 576 | // unmock isGranted 577 | doCallRealMethod().when(mRxPermissions).isGranted(anyString()); 578 | doReturn(false).when(mRxPermissions).isMarshmallow(); 579 | 580 | boolean granted = mRxPermissions.isGranted("p"); 581 | 582 | assertTrue(granted); 583 | } 584 | 585 | @Test 586 | @TargetApi(Build.VERSION_CODES.M) 587 | public void isGranted_granted() { 588 | // unmock isGranted 589 | doCallRealMethod().when(mRxPermissions).isGranted(anyString()); 590 | doReturn(true).when(mRxPermissions).isMarshmallow(); 591 | when(mActivity.checkSelfPermission("p")).thenReturn(PackageManager.PERMISSION_GRANTED); 592 | 593 | boolean granted = mRxPermissions.isGranted("p"); 594 | 595 | assertTrue(granted); 596 | } 597 | 598 | @Test 599 | @TargetApi(Build.VERSION_CODES.M) 600 | public void isGranted_denied() { 601 | // unmock isGranted 602 | doCallRealMethod().when(mRxPermissions).isGranted(anyString()); 603 | doReturn(true).when(mRxPermissions).isMarshmallow(); 604 | when(mActivity.checkSelfPermission("p")).thenReturn(PackageManager.PERMISSION_DENIED); 605 | 606 | boolean granted = mRxPermissions.isGranted("p"); 607 | 608 | assertFalse(granted); 609 | } 610 | 611 | @Test 612 | public void isRevoked_preMarshmallow() { 613 | // unmock isRevoked 614 | doCallRealMethod().when(mRxPermissions).isRevoked(anyString()); 615 | doReturn(false).when(mRxPermissions).isMarshmallow(); 616 | 617 | boolean revoked = mRxPermissions.isRevoked("p"); 618 | 619 | assertFalse(revoked); 620 | } 621 | 622 | @Test 623 | @TargetApi(Build.VERSION_CODES.M) 624 | public void isRevoked_true() { 625 | // unmock isRevoked 626 | doCallRealMethod().when(mRxPermissions).isRevoked(anyString()); 627 | doReturn(true).when(mRxPermissions).isMarshmallow(); 628 | PackageManager pm = mock(PackageManager.class); 629 | when(mActivity.getPackageManager()).thenReturn(pm); 630 | when(pm.isPermissionRevokedByPolicy(eq("p"), anyString())).thenReturn(true); 631 | 632 | boolean revoked = mRxPermissions.isRevoked("p"); 633 | 634 | assertTrue(revoked); 635 | } 636 | 637 | @Test 638 | @TargetApi(Build.VERSION_CODES.M) 639 | public void isGranted_false() { 640 | // unmock isRevoked 641 | doCallRealMethod().when(mRxPermissions).isRevoked(anyString()); 642 | doReturn(true).when(mRxPermissions).isMarshmallow(); 643 | PackageManager pm = mock(PackageManager.class); 644 | when(mActivity.getPackageManager()).thenReturn(pm); 645 | when(pm.isPermissionRevokedByPolicy(eq("p"), anyString())).thenReturn(false); 646 | 647 | boolean revoked = mRxPermissions.isRevoked("p"); 648 | 649 | assertFalse(revoked); 650 | } 651 | } 652 | -------------------------------------------------------------------------------- /sample/build.gradle: -------------------------------------------------------------------------------- 1 | apply plugin: 'com.android.application' 2 | 3 | android { 4 | compileSdkVersion rootProject.ext.compileSdkVersion 5 | 6 | compileOptions { 7 | sourceCompatibility JavaVersion.VERSION_1_8 8 | targetCompatibility JavaVersion.VERSION_1_8 9 | } 10 | 11 | defaultConfig { 12 | applicationId "com.tbruyelle.rxpermissions.sample" 13 | minSdkVersion 14 14 | 15 | targetSdkVersion rootProject.ext.targetSdkVersion 16 | versionCode 1 17 | versionName "1.0" 18 | } 19 | 20 | packagingOptions { 21 | exclude 'META-INF/rxjava.properties' 22 | } 23 | } 24 | 25 | dependencies { 26 | implementation project(':rxpermissions') 27 | 28 | implementation 'com.jakewharton.rxbinding4:rxbinding:4.0.0' 29 | implementation rootProject.ext.androidXAppcompat 30 | 31 | testImplementation 'junit:junit:4.13' 32 | testImplementation rootProject.ext.mockito 33 | } 34 | -------------------------------------------------------------------------------- /sample/src/main/AndroidManifest.xml: -------------------------------------------------------------------------------- 1 | 2 | 7 | 8 | 9 | 10 | 18 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | -------------------------------------------------------------------------------- /sample/src/main/java/com/tbruyelle/rxpermissions3/sample/MainActivity.java: -------------------------------------------------------------------------------- 1 | package com.tbruyelle.rxpermissions3.sample; 2 | 3 | import android.Manifest.permission; 4 | import android.hardware.Camera; 5 | import android.os.Bundle; 6 | import android.util.Log; 7 | import android.view.SurfaceView; 8 | import android.widget.Toast; 9 | 10 | import androidx.appcompat.app.AppCompatActivity; 11 | 12 | import com.jakewharton.rxbinding4.view.RxView; 13 | import com.tbruyelle.rxpermissions3.Permission; 14 | import com.tbruyelle.rxpermissions3.RxPermissions; 15 | 16 | import java.io.IOException; 17 | 18 | import io.reactivex.rxjava3.disposables.Disposable; 19 | import io.reactivex.rxjava3.functions.Action; 20 | import io.reactivex.rxjava3.functions.Consumer; 21 | 22 | 23 | public class MainActivity extends AppCompatActivity { 24 | 25 | private static final String TAG = "RxPermissionsSample"; 26 | 27 | private Camera camera; 28 | private SurfaceView surfaceView; 29 | private Disposable disposable; 30 | 31 | @Override 32 | protected void onCreate(Bundle savedInstanceState) { 33 | super.onCreate(savedInstanceState); 34 | RxPermissions rxPermissions = new RxPermissions(this); 35 | rxPermissions.setLogging(true); 36 | 37 | setContentView(R.layout.act_main); 38 | surfaceView = findViewById(R.id.surfaceView); 39 | 40 | disposable = RxView.clicks(findViewById(R.id.enableCamera)) 41 | // Ask for permissions when button is clicked 42 | .compose(rxPermissions.ensureEach(permission.CAMERA)) 43 | .subscribe(new Consumer() { 44 | @Override 45 | public void accept(Permission permission) { 46 | Log.i(TAG, "Permission result " + permission); 47 | if (permission.granted) { 48 | releaseCamera(); 49 | camera = Camera.open(0); 50 | try { 51 | camera.setPreviewDisplay(surfaceView.getHolder()); 52 | camera.startPreview(); 53 | } catch (IOException e) { 54 | Log.e(TAG, "Error while trying to display the camera preview", e); 55 | } 56 | } else if (permission.shouldShowRequestPermissionRationale) { 57 | // Denied permission without ask never again 58 | Toast.makeText(MainActivity.this, 59 | "Denied permission without ask never again", 60 | Toast.LENGTH_SHORT).show(); 61 | } else { 62 | // Denied permission with ask never again 63 | // Need to go to the settings 64 | Toast.makeText(MainActivity.this, 65 | "Permission denied, can't enable the camera", 66 | Toast.LENGTH_SHORT).show(); 67 | } 68 | } 69 | }, 70 | new Consumer() { 71 | @Override 72 | public void accept(Throwable t) { 73 | Log.e(TAG, "onError", t); 74 | } 75 | }, 76 | new Action() { 77 | @Override 78 | public void run() { 79 | Log.i(TAG, "OnComplete"); 80 | } 81 | }); 82 | } 83 | 84 | @Override 85 | protected void onDestroy() { 86 | if (disposable != null && !disposable.isDisposed()) { 87 | disposable.dispose(); 88 | } 89 | super.onDestroy(); 90 | } 91 | 92 | @Override 93 | protected void onStop() { 94 | super.onStop(); 95 | releaseCamera(); 96 | } 97 | 98 | private void releaseCamera() { 99 | if (camera != null) { 100 | camera.release(); 101 | camera = null; 102 | } 103 | } 104 | 105 | } -------------------------------------------------------------------------------- /sample/src/main/res/layout/act_main.xml: -------------------------------------------------------------------------------- 1 | 8 | 9 | 14 | 15 |