| /* |
| * Copyright (C) 2017 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package android.net.ip; |
| |
| import static android.net.util.NetworkStackUtils.IPCLIENT_PARSE_NETLINK_EVENTS_VERSION; |
| import static android.system.OsConstants.RT_SCOPE_UNIVERSE; |
| |
| import static org.junit.Assert.assertArrayEquals; |
| import static org.junit.Assert.assertEquals; |
| import static org.junit.Assert.assertFalse; |
| import static org.junit.Assert.assertNull; |
| import static org.junit.Assert.assertTrue; |
| import static org.junit.Assert.fail; |
| import static org.mockito.Mockito.any; |
| import static org.mockito.Mockito.anyBoolean; |
| import static org.mockito.Mockito.anyString; |
| import static org.mockito.Mockito.doReturn; |
| import static org.mockito.Mockito.eq; |
| import static org.mockito.Mockito.never; |
| import static org.mockito.Mockito.reset; |
| import static org.mockito.Mockito.timeout; |
| import static org.mockito.Mockito.times; |
| import static org.mockito.Mockito.verify; |
| import static org.mockito.Mockito.verifyNoMoreInteractions; |
| import static org.mockito.Mockito.when; |
| |
| import static java.util.Collections.emptySet; |
| |
| import android.annotation.SuppressLint; |
| import android.app.AlarmManager; |
| import android.content.ContentResolver; |
| import android.content.Context; |
| import android.content.res.Resources; |
| import android.net.ConnectivityManager; |
| import android.net.INetd; |
| import android.net.InetAddresses; |
| import android.net.IpPrefix; |
| import android.net.LinkAddress; |
| import android.net.LinkProperties; |
| import android.net.MacAddress; |
| import android.net.NetworkStackIpMemoryStore; |
| import android.net.RouteInfo; |
| import android.net.apf.ApfCapabilities; |
| import android.net.apf.ApfFilter.ApfConfiguration; |
| import android.net.ipmemorystore.NetworkAttributes; |
| import android.net.metrics.IpConnectivityLog; |
| import android.net.shared.InitialConfiguration; |
| import android.net.shared.Layer2Information; |
| import android.net.shared.ProvisioningConfiguration; |
| import android.net.shared.ProvisioningConfiguration.ScanResultInfo; |
| import android.net.util.InterfaceParams; |
| import android.os.Build; |
| |
| import androidx.test.filters.SmallTest; |
| import androidx.test.runner.AndroidJUnit4; |
| |
| import com.android.networkstack.R; |
| import com.android.server.NetworkObserver; |
| import com.android.server.NetworkObserverRegistry; |
| import com.android.server.NetworkStackService; |
| import com.android.server.connectivity.ipmemorystore.IpMemoryStoreService; |
| import com.android.testutils.DevSdkIgnoreRule; |
| import com.android.testutils.DevSdkIgnoreRule.IgnoreAfter; |
| import com.android.testutils.DevSdkIgnoreRule.IgnoreUpTo; |
| import com.android.testutils.HandlerUtils; |
| |
| import org.junit.Before; |
| import org.junit.Rule; |
| import org.junit.Test; |
| import org.junit.runner.RunWith; |
| import org.mockito.ArgumentCaptor; |
| import org.mockito.Mock; |
| import org.mockito.MockitoAnnotations; |
| |
| import java.net.Inet4Address; |
| import java.net.Inet6Address; |
| import java.net.InetAddress; |
| import java.nio.ByteBuffer; |
| import java.util.Arrays; |
| import java.util.Collections; |
| import java.util.HashSet; |
| import java.util.List; |
| import java.util.Random; |
| import java.util.Set; |
| |
| |
| /** |
| * Tests for IpClient. |
| */ |
| @RunWith(AndroidJUnit4.class) |
| @SmallTest |
| public class IpClientTest { |
| @Rule |
| public final DevSdkIgnoreRule mIgnoreRule = new DevSdkIgnoreRule(); |
| |
| private static final String VALID = "VALID"; |
| private static final String INVALID = "INVALID"; |
| private static final String TEST_IFNAME = "test_wlan0"; |
| private static final int TEST_IFINDEX = 1001; |
| // See RFC 7042#section-2.1.2 for EUI-48 documentation values. |
| private static final MacAddress TEST_MAC = MacAddress.fromString("00:00:5E:00:53:01"); |
| private static final int TEST_TIMEOUT_MS = 30_000; |
| private static final String TEST_L2KEY = "some l2key"; |
| private static final String TEST_CLUSTER = "some cluster"; |
| private static final String TEST_SSID = "test_ssid"; |
| private static final String TEST_BSSID = "00:11:22:33:44:55"; |
| private static final String TEST_BSSID2 = "00:1A:11:22:33:44"; |
| |
| private static final String TEST_GLOBAL_ADDRESS = "1234:4321::548d:2db2:4fcf:ef75/64"; |
| private static final String[] TEST_LOCAL_ADDRESSES = { |
| "fe80::a4be:f92:e1f7:22d1/64", |
| "fe80::f04a:8f6:6a32:d756/64", |
| "fd2c:4e57:8e3c:0:548d:2db2:4fcf:ef75/64" |
| }; |
| private static final String TEST_IPV4_LINKADDRESS = "192.168.42.24/24"; |
| private static final String[] TEST_PREFIXES = { "fe80::/64", "fd2c:4e57:8e3c::/64" }; |
| private static final String[] TEST_DNSES = { "fd2c:4e57:8e3c::42" }; |
| private static final String TEST_IPV6_GATEWAY = "fd2c:4e57:8e3c::43"; |
| private static final String TEST_IPV4_GATEWAY = "192.168.42.11"; |
| private static final long TEST_DNS_LIFETIME = 3600; |
| |
| @Mock private Context mContext; |
| @Mock private ConnectivityManager mCm; |
| @Mock private NetworkObserverRegistry mObserverRegistry; |
| @Mock private INetd mNetd; |
| @Mock private Resources mResources; |
| @Mock private IIpClientCallbacks mCb; |
| @Mock private AlarmManager mAlarm; |
| @Mock private IpClient.Dependencies mDependencies; |
| @Mock private ContentResolver mContentResolver; |
| @Mock private NetworkStackService.NetworkStackServiceManager mNetworkStackServiceManager; |
| @Mock private NetworkStackIpMemoryStore mIpMemoryStore; |
| @Mock private IpMemoryStoreService mIpMemoryStoreService; |
| @Mock private InterfaceParams mInterfaceParams; |
| @Mock private IpConnectivityLog mMetricsLog; |
| |
| private NetworkObserver mObserver; |
| private InterfaceParams mIfParams; |
| |
| @Before |
| public void setUp() throws Exception { |
| MockitoAnnotations.initMocks(this); |
| |
| when(mContext.getSystemService(eq(Context.ALARM_SERVICE))).thenReturn(mAlarm); |
| when(mContext.getSystemService(eq(ConnectivityManager.class))).thenReturn(mCm); |
| when(mContext.getResources()).thenReturn(mResources); |
| when(mDependencies.getNetd(any())).thenReturn(mNetd); |
| when(mCm.shouldAvoidBadWifi()).thenReturn(true); |
| when(mContext.getContentResolver()).thenReturn(mContentResolver); |
| when(mNetworkStackServiceManager.getIpMemoryStoreService()) |
| .thenReturn(mIpMemoryStoreService); |
| when(mDependencies.getInterfaceParams(any())).thenReturn(mInterfaceParams); |
| when(mDependencies.getIpMemoryStore(mContext, mNetworkStackServiceManager)) |
| .thenReturn(mIpMemoryStore); |
| when(mDependencies.getIpConnectivityLog()).thenReturn(mMetricsLog); |
| when(mDependencies.isFeatureEnabled(eq(mContext), |
| eq(IPCLIENT_PARSE_NETLINK_EVENTS_VERSION), anyBoolean())).thenReturn(false); |
| |
| mIfParams = null; |
| } |
| |
| private void setTestInterfaceParams(String ifname) { |
| mIfParams = (ifname != null) |
| ? new InterfaceParams(ifname, TEST_IFINDEX, TEST_MAC) |
| : null; |
| when(mDependencies.getInterfaceParams(anyString())).thenReturn(mIfParams); |
| } |
| |
| private IpClient makeIpClient(String ifname) throws Exception { |
| setTestInterfaceParams(ifname); |
| final IpClient ipc = new IpClient(mContext, ifname, mCb, mObserverRegistry, |
| mNetworkStackServiceManager, mDependencies); |
| verify(mNetd, timeout(TEST_TIMEOUT_MS).times(1)).interfaceSetEnableIPv6(ifname, false); |
| verify(mNetd, timeout(TEST_TIMEOUT_MS).times(1)).interfaceClearAddrs(ifname); |
| ArgumentCaptor<NetworkObserver> arg = ArgumentCaptor.forClass(NetworkObserver.class); |
| verify(mObserverRegistry, times(1)).registerObserverForNonblockingCallback(arg.capture()); |
| mObserver = arg.getValue(); |
| reset(mObserverRegistry); |
| reset(mNetd); |
| // Verify IpClient doesn't call onLinkPropertiesChange() when it starts. |
| verify(mCb, never()).onLinkPropertiesChange(any()); |
| reset(mCb); |
| return ipc; |
| } |
| |
| private static LinkProperties makeEmptyLinkProperties(String iface) { |
| final LinkProperties empty = new LinkProperties(); |
| empty.setInterfaceName(iface); |
| return empty; |
| } |
| |
| private void verifyNetworkAttributesStored(final String l2Key, |
| final NetworkAttributes attributes) { |
| // TODO : when storing is implemented, turn this on |
| // verify(mIpMemoryStore).storeNetworkAttributes(eq(l2Key), eq(attributes), any()); |
| } |
| |
| @Test |
| public void testNullInterfaceNameMostDefinitelyThrows() throws Exception { |
| setTestInterfaceParams(null); |
| try { |
| final IpClient ipc = new IpClient(mContext, null, mCb, mObserverRegistry, |
| mNetworkStackServiceManager, mDependencies); |
| ipc.shutdown(); |
| fail(); |
| } catch (NullPointerException npe) { |
| // Phew; null interface names not allowed. |
| } |
| } |
| |
| @Test |
| public void testNullCallbackMostDefinitelyThrows() throws Exception { |
| final String ifname = "lo"; |
| setTestInterfaceParams(ifname); |
| try { |
| final IpClient ipc = new IpClient(mContext, ifname, null, mObserverRegistry, |
| mNetworkStackServiceManager, mDependencies); |
| ipc.shutdown(); |
| fail(); |
| } catch (NullPointerException npe) { |
| // Phew; null callbacks not allowed. |
| } |
| } |
| |
| @Test |
| public void testInvalidInterfaceDoesNotThrow() throws Exception { |
| setTestInterfaceParams(TEST_IFNAME); |
| final IpClient ipc = new IpClient(mContext, TEST_IFNAME, mCb, mObserverRegistry, |
| mNetworkStackServiceManager, mDependencies); |
| verifyNoMoreInteractions(mIpMemoryStore); |
| ipc.shutdown(); |
| } |
| |
| @Test |
| public void testInterfaceNotFoundFailsImmediately() throws Exception { |
| setTestInterfaceParams(null); |
| final IpClient ipc = new IpClient(mContext, TEST_IFNAME, mCb, mObserverRegistry, |
| mNetworkStackServiceManager, mDependencies); |
| ipc.startProvisioning(new ProvisioningConfiguration()); |
| verify(mCb, timeout(TEST_TIMEOUT_MS).times(1)).onProvisioningFailure(any()); |
| verify(mIpMemoryStore, never()).storeNetworkAttributes(any(), any(), any()); |
| ipc.shutdown(); |
| } |
| |
| private LinkProperties makeIPv6ProvisionedLinkProperties() { |
| // Add local addresses, and a global address with global scope |
| final Set<LinkAddress> addresses = links(TEST_LOCAL_ADDRESSES); |
| addresses.add(new LinkAddress(TEST_GLOBAL_ADDRESS, 0, RT_SCOPE_UNIVERSE)); |
| |
| // Add a route on the interface for each prefix, and a global route |
| final Set<RouteInfo> routes = routes(TEST_PREFIXES); |
| routes.add(defaultIPV6Route(TEST_IPV6_GATEWAY)); |
| |
| return linkproperties(addresses, routes, ips(TEST_DNSES)); |
| } |
| |
| private IpClient doProvisioningWithDefaultConfiguration() throws Exception { |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| |
| ProvisioningConfiguration config = new ProvisioningConfiguration.Builder() |
| .withoutIPv4() |
| // TODO: mock IpReachabilityMonitor's dependencies (NetworkInterface, PowerManager) |
| // and enable it in this test |
| .withoutIpReachabilityMonitor() |
| .build(); |
| |
| ipc.startProvisioning(config); |
| verify(mCb, timeout(TEST_TIMEOUT_MS).times(1)).setNeighborDiscoveryOffload(true); |
| verify(mCb, timeout(TEST_TIMEOUT_MS).times(1)).setFallbackMulticastFilter(false); |
| |
| final LinkProperties lp = makeIPv6ProvisionedLinkProperties(); |
| lp.getRoutes().forEach(mObserver::onRouteUpdated); |
| lp.getLinkAddresses().forEach(la -> mObserver.onInterfaceAddressUpdated(la, TEST_IFNAME)); |
| mObserver.onInterfaceDnsServerInfo(TEST_IFNAME, TEST_DNS_LIFETIME, |
| lp.getDnsServers().stream().map(InetAddress::getHostAddress) |
| .toArray(String[]::new)); |
| |
| HandlerUtils.waitForIdle(ipc.getHandler(), TEST_TIMEOUT_MS); |
| verify(mCb, never()).onProvisioningFailure(any()); |
| verify(mIpMemoryStore, never()).storeNetworkAttributes(any(), any(), any()); |
| |
| verify(mCb).onProvisioningSuccess(lp); |
| return ipc; |
| } |
| |
| @SuppressLint("NewApi") |
| private void addIPv4Provisioning(LinkProperties lp) { |
| final LinkAddress la = new LinkAddress(TEST_IPV4_LINKADDRESS); |
| final RouteInfo defaultRoute = new RouteInfo(new IpPrefix(Inet4Address.ANY, 0), |
| InetAddresses.parseNumericAddress(TEST_IPV4_GATEWAY), TEST_IFNAME); |
| mObserver.onInterfaceAddressUpdated(la, TEST_IFNAME); |
| mObserver.onRouteUpdated(defaultRoute); |
| |
| lp.addLinkAddress(la); |
| lp.addRoute(defaultRoute); |
| } |
| |
| /** |
| * Simulate loss of IPv6 provisioning (default route lost). |
| * |
| * @return The expected new LinkProperties. |
| */ |
| private void doIPv6ProvisioningLoss(LinkProperties lp) { |
| final RouteInfo defaultRoute = defaultIPV6Route(TEST_IPV6_GATEWAY); |
| mObserver.onRouteRemoved(defaultRoute); |
| |
| lp.removeRoute(defaultRoute); |
| } |
| |
| private void doDefaultIPv6ProvisioningConfigurationAndProvisioningLossTest(boolean avoidBadWifi) |
| throws Exception { |
| when(mCm.shouldAvoidBadWifi()).thenReturn(avoidBadWifi); |
| final IpClient ipc = doProvisioningWithDefaultConfiguration(); |
| final LinkProperties lp = makeIPv6ProvisionedLinkProperties(); |
| |
| reset(mCb); |
| doIPv6ProvisioningLoss(lp); |
| HandlerUtils.waitForIdle(ipc.getHandler(), TEST_TIMEOUT_MS); |
| verify(mCb).onProvisioningFailure(lp); |
| verify(mCb).onLinkPropertiesChange(makeEmptyLinkProperties(TEST_IFNAME)); |
| |
| verifyShutdown(ipc); |
| } |
| |
| @Test |
| public void testDefaultIPv6ProvisioningConfiguration_AvoidBadWifi() throws Exception { |
| doDefaultIPv6ProvisioningConfigurationAndProvisioningLossTest(true /* avoidBadWifi */); |
| } |
| |
| @Test |
| public void testDefaultIPv6ProvisioningConfiguration_StayOnBadWifi() throws Exception { |
| // Even when avoidBadWifi=false, if IPv6 only, loss of all provisioning causes |
| // onProvisioningFailure to be called. |
| doDefaultIPv6ProvisioningConfigurationAndProvisioningLossTest(false /* avoidBadWifi */); |
| } |
| |
| private void doDefaultDualStackProvisioningConfigurationTest( |
| boolean avoidBadWifi) throws Exception { |
| when(mCm.shouldAvoidBadWifi()).thenReturn(avoidBadWifi); |
| final IpClient ipc = doProvisioningWithDefaultConfiguration(); |
| final LinkProperties lp = makeIPv6ProvisionedLinkProperties(); |
| addIPv4Provisioning(lp); |
| HandlerUtils.waitForIdle(ipc.getHandler(), TEST_TIMEOUT_MS); |
| |
| reset(mCb); |
| doIPv6ProvisioningLoss(lp); |
| HandlerUtils.waitForIdle(ipc.getHandler(), TEST_TIMEOUT_MS); |
| if (avoidBadWifi) { // Provisioning failure is expected only when avoidBadWifi is true |
| verify(mCb).onProvisioningFailure(lp); |
| verify(mCb).onLinkPropertiesChange(makeEmptyLinkProperties(TEST_IFNAME)); |
| } else { |
| verify(mCb, never()).onProvisioningFailure(any()); |
| verify(mCb).onLinkPropertiesChange(lp); |
| } |
| |
| verifyShutdown(ipc); |
| } |
| |
| @Test |
| public void testDefaultDualStackProvisioningConfiguration_AvoidBadWifi() throws Exception { |
| doDefaultDualStackProvisioningConfigurationTest(true /* avoidBadWifi */); |
| } |
| |
| @Test |
| public void testDefaultDualStackProvisioningConfiguration_StayOnBadWifi() throws Exception { |
| doDefaultDualStackProvisioningConfigurationTest(false /* avoidBadWifi */); |
| } |
| |
| @Test |
| public void testProvisioningWithInitialConfiguration() throws Exception { |
| final String iface = TEST_IFNAME; |
| final IpClient ipc = makeIpClient(iface); |
| final String l2Key = TEST_L2KEY; |
| final String cluster = TEST_CLUSTER; |
| |
| ProvisioningConfiguration config = new ProvisioningConfiguration.Builder() |
| .withoutIPv4() |
| .withoutIpReachabilityMonitor() |
| .withInitialConfiguration( |
| conf(links(TEST_LOCAL_ADDRESSES), prefixes(TEST_PREFIXES), ips())) |
| .build(); |
| |
| ipc.startProvisioning(config); |
| verify(mCb, timeout(TEST_TIMEOUT_MS).times(1)).setNeighborDiscoveryOffload(true); |
| verify(mCb, timeout(TEST_TIMEOUT_MS).times(1)).setFallbackMulticastFilter(false); |
| verify(mCb, never()).onProvisioningFailure(any()); |
| ipc.setL2KeyAndCluster(l2Key, cluster); |
| |
| for (String addr : TEST_LOCAL_ADDRESSES) { |
| String[] parts = addr.split("/"); |
| verify(mNetd, timeout(TEST_TIMEOUT_MS).times(1)) |
| .interfaceAddAddress(iface, parts[0], Integer.parseInt(parts[1])); |
| } |
| |
| final int lastAddr = TEST_LOCAL_ADDRESSES.length - 1; |
| |
| // Add N - 1 addresses |
| for (int i = 0; i < lastAddr; i++) { |
| mObserver.onInterfaceAddressUpdated(new LinkAddress(TEST_LOCAL_ADDRESSES[i]), iface); |
| verify(mCb, timeout(TEST_TIMEOUT_MS)).onLinkPropertiesChange(any()); |
| reset(mCb); |
| } |
| |
| // Add Nth address |
| mObserver.onInterfaceAddressUpdated(new LinkAddress(TEST_LOCAL_ADDRESSES[lastAddr]), iface); |
| LinkProperties want = linkproperties(links(TEST_LOCAL_ADDRESSES), |
| routes(TEST_PREFIXES), emptySet() /* dnses */); |
| want.setInterfaceName(iface); |
| verify(mCb, timeout(TEST_TIMEOUT_MS).times(1)).onProvisioningSuccess(want); |
| verifyNetworkAttributesStored(l2Key, new NetworkAttributes.Builder() |
| .setCluster(cluster) |
| .build()); |
| } |
| |
| private void verifyShutdown(IpClient ipc) throws Exception { |
| ipc.shutdown(); |
| verify(mNetd, timeout(TEST_TIMEOUT_MS).times(1)).interfaceSetEnableIPv6(TEST_IFNAME, false); |
| verify(mNetd, timeout(TEST_TIMEOUT_MS).times(1)).interfaceClearAddrs(TEST_IFNAME); |
| verify(mCb, timeout(TEST_TIMEOUT_MS).times(1)) |
| .onLinkPropertiesChange(makeEmptyLinkProperties(TEST_IFNAME)); |
| verifyNoMoreInteractions(mIpMemoryStore); |
| } |
| |
| @Test |
| public void testIsProvisioned() throws Exception { |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| InitialConfiguration empty = conf(links(), prefixes()); |
| IsProvisionedTestCase[] testcases = { |
| // nothing |
| notProvisionedCase(links(), routes(), dns(), null), |
| notProvisionedCase(links(), routes(), dns(), empty), |
| |
| // IPv4 |
| provisionedCase(links("192.0.2.12/24"), routes(), dns(), empty), |
| |
| // IPv6 |
| notProvisionedCase( |
| links("fe80::a4be:f92:e1f7:22d1/64", "fd2c:4e57:8e3c:0:548d:2db2:4fcf:ef75/64"), |
| routes(), dns(), empty), |
| notProvisionedCase( |
| links("fe80::a4be:f92:e1f7:22d1/64", "fd2c:4e57:8e3c:0:548d:2db2:4fcf:ef75/64"), |
| routes("fe80::/64", "fd2c:4e57:8e3c::/64"), dns("fd00:1234:5678::1000"), empty), |
| provisionedCase( |
| links("2001:db8:dead:beef:f00::a0/64", "fe80::1/64"), |
| routes("::/0"), |
| dns("2001:db8:dead:beef:f00::02"), empty), |
| |
| // Initial configuration |
| provisionedCase( |
| links("fe80::e1f7:22d1/64", "fd2c:4e57:8e3c:0:548d:2db2:4fcf:ef75/64"), |
| routes("fe80::/64", "fd2c:4e57:8e3c::/64"), |
| dns(), |
| conf(links("fe80::e1f7:22d1/64", "fd2c:4e57:8e3c:0:548d:2db2:4fcf:ef75/64"), |
| prefixes( "fe80::/64", "fd2c:4e57:8e3c::/64"), ips())) |
| }; |
| |
| for (IsProvisionedTestCase testcase : testcases) { |
| if (ipc.isProvisioned(testcase.lp, testcase.config) != testcase.isProvisioned) { |
| fail(testcase.errorMessage()); |
| } |
| } |
| } |
| |
| static class IsProvisionedTestCase { |
| boolean isProvisioned; |
| LinkProperties lp; |
| InitialConfiguration config; |
| |
| String errorMessage() { |
| return String.format("expected %s with config %s to be %s, but was %s", |
| lp, config, provisioned(isProvisioned), provisioned(!isProvisioned)); |
| } |
| |
| static String provisioned(boolean isProvisioned) { |
| return isProvisioned ? "provisioned" : "not provisioned"; |
| } |
| } |
| |
| static IsProvisionedTestCase provisionedCase(Set<LinkAddress> lpAddrs, Set<RouteInfo> lpRoutes, |
| Set<InetAddress> lpDns, InitialConfiguration config) { |
| return provisioningTest(true, lpAddrs, lpRoutes, lpDns, config); |
| } |
| |
| static IsProvisionedTestCase notProvisionedCase(Set<LinkAddress> lpAddrs, |
| Set<RouteInfo> lpRoutes, Set<InetAddress> lpDns, InitialConfiguration config) { |
| return provisioningTest(false, lpAddrs, lpRoutes, lpDns, config); |
| } |
| |
| static IsProvisionedTestCase provisioningTest(boolean isProvisioned, Set<LinkAddress> lpAddrs, |
| Set<RouteInfo> lpRoutes, Set<InetAddress> lpDns, InitialConfiguration config) { |
| IsProvisionedTestCase testcase = new IsProvisionedTestCase(); |
| testcase.isProvisioned = isProvisioned; |
| testcase.lp = makeEmptyLinkProperties(TEST_IFNAME); |
| testcase.lp.setLinkAddresses(lpAddrs); |
| for (RouteInfo route : lpRoutes) { |
| testcase.lp.addRoute(route); |
| } |
| for (InetAddress dns : lpDns) { |
| testcase.lp.addDnsServer(dns); |
| } |
| testcase.config = config; |
| return testcase; |
| } |
| |
| @Test |
| public void testInitialConfigurations() throws Exception { |
| InitialConfigurationTestCase[] testcases = { |
| validConf("valid IPv4 configuration", |
| links("192.0.2.12/24"), prefixes("192.0.2.0/24"), dns("192.0.2.2")), |
| validConf("another valid IPv4 configuration", |
| links("192.0.2.12/24"), prefixes("192.0.2.0/24"), dns()), |
| validConf("valid IPv6 configurations", |
| links("2001:db8:dead:beef:f00::a0/64", "fe80::1/64"), |
| prefixes("2001:db8:dead:beef::/64", "fe80::/64"), |
| dns("2001:db8:dead:beef:f00::02")), |
| validConf("valid IPv6 configurations", |
| links("fe80::1/64"), prefixes("fe80::/64"), dns()), |
| validConf("valid IPv6/v4 configuration", |
| links("2001:db8:dead:beef:f00::a0/48", "192.0.2.12/24"), |
| prefixes("2001:db8:dead:beef::/64", "192.0.2.0/24"), |
| dns("192.0.2.2", "2001:db8:dead:beef:f00::02")), |
| validConf("valid IPv6 configuration without any GUA.", |
| links("fd00:1234:5678::1/48"), |
| prefixes("fd00:1234:5678::/48"), |
| dns("fd00:1234:5678::1000")), |
| |
| invalidConf("empty configuration", links(), prefixes(), dns()), |
| invalidConf("v4 addr and dns not in any prefix", |
| links("192.0.2.12/24"), prefixes("198.51.100.0/24"), dns("192.0.2.2")), |
| invalidConf("v4 addr not in any prefix", |
| links("198.51.2.12/24"), prefixes("198.51.100.0/24"), dns("192.0.2.2")), |
| invalidConf("v4 dns addr not in any prefix", |
| links("192.0.2.12/24"), prefixes("192.0.2.0/24"), dns("198.51.100.2")), |
| invalidConf("v6 addr not in any prefix", |
| links("2001:db8:dead:beef:f00::a0/64", "fe80::1/64"), |
| prefixes("2001:db8:dead:beef::/64"), |
| dns("2001:db8:dead:beef:f00::02")), |
| invalidConf("v6 dns addr not in any prefix", |
| links("fe80::1/64"), prefixes("fe80::/64"), dns("2001:db8:dead:beef:f00::02")), |
| invalidConf("default ipv6 route and no GUA", |
| links("fd01:1111:2222:3333::a0/128"), prefixes("::/0"), dns()), |
| invalidConf("invalid v6 prefix length", |
| links("2001:db8:dead:beef:f00::a0/128"), prefixes("2001:db8:dead:beef::/32"), |
| dns()), |
| invalidConf("another invalid v6 prefix length", |
| links("2001:db8:dead:beef:f00::a0/128"), prefixes("2001:db8:dead:beef::/72"), |
| dns()) |
| }; |
| |
| for (InitialConfigurationTestCase testcase : testcases) { |
| if (testcase.config.isValid() != testcase.isValid) { |
| fail(testcase.errorMessage()); |
| } |
| } |
| } |
| |
| static class InitialConfigurationTestCase { |
| String descr; |
| boolean isValid; |
| InitialConfiguration config; |
| public String errorMessage() { |
| return String.format("%s: expected configuration %s to be %s, but was %s", |
| descr, config, validString(isValid), validString(!isValid)); |
| } |
| static String validString(boolean isValid) { |
| return isValid ? VALID : INVALID; |
| } |
| } |
| |
| static InitialConfigurationTestCase validConf(String descr, Set<LinkAddress> links, |
| Set<IpPrefix> prefixes, Set<InetAddress> dns) { |
| return confTestCase(descr, true, conf(links, prefixes, dns)); |
| } |
| |
| static InitialConfigurationTestCase invalidConf(String descr, Set<LinkAddress> links, |
| Set<IpPrefix> prefixes, Set<InetAddress> dns) { |
| return confTestCase(descr, false, conf(links, prefixes, dns)); |
| } |
| |
| static InitialConfigurationTestCase confTestCase( |
| String descr, boolean isValid, InitialConfiguration config) { |
| InitialConfigurationTestCase testcase = new InitialConfigurationTestCase(); |
| testcase.descr = descr; |
| testcase.isValid = isValid; |
| testcase.config = config; |
| return testcase; |
| } |
| |
| static LinkProperties linkproperties(Set<LinkAddress> addresses, |
| Set<RouteInfo> routes, Set<InetAddress> dnses) { |
| LinkProperties lp = makeEmptyLinkProperties(TEST_IFNAME); |
| lp.setLinkAddresses(addresses); |
| routes.forEach(lp::addRoute); |
| dnses.forEach(lp::addDnsServer); |
| return lp; |
| } |
| |
| static InitialConfiguration conf(Set<LinkAddress> links, Set<IpPrefix> prefixes) { |
| return conf(links, prefixes, new HashSet<>()); |
| } |
| |
| static InitialConfiguration conf( |
| Set<LinkAddress> links, Set<IpPrefix> prefixes, Set<InetAddress> dns) { |
| InitialConfiguration conf = new InitialConfiguration(); |
| conf.ipAddresses.addAll(links); |
| conf.directlyConnectedRoutes.addAll(prefixes); |
| conf.dnsServers.addAll(dns); |
| return conf; |
| } |
| |
| static Set<RouteInfo> routes(String... routes) { |
| return mapIntoSet(routes, (r) -> new RouteInfo(new IpPrefix(r), null /* gateway */, |
| TEST_IFNAME)); |
| } |
| |
| @SuppressLint("NewApi") |
| static RouteInfo defaultIPV6Route(String gateway) { |
| return new RouteInfo(new IpPrefix(Inet6Address.ANY, 0), |
| InetAddresses.parseNumericAddress(gateway), TEST_IFNAME); |
| } |
| |
| static Set<IpPrefix> prefixes(String... prefixes) { |
| return mapIntoSet(prefixes, IpPrefix::new); |
| } |
| |
| static Set<LinkAddress> links(String... addresses) { |
| return mapIntoSet(addresses, LinkAddress::new); |
| } |
| |
| static Set<InetAddress> ips(String... addresses) { |
| return mapIntoSet(addresses, InetAddress::getByName); |
| } |
| |
| static Set<InetAddress> dns(String... addresses) { |
| return ips(addresses); |
| } |
| |
| static <A, B> Set<B> mapIntoSet(A[] in, Fn<A, B> fn) { |
| Set<B> out = new HashSet<>(in.length); |
| for (A item : in) { |
| try { |
| out.add(fn.call(item)); |
| } catch (Exception e) { |
| throw new RuntimeException(e); |
| } |
| } |
| return out; |
| } |
| |
| private ApfConfiguration verifyApfFilterCreatedOnStart(IpClient ipc) { |
| ProvisioningConfiguration config = new ProvisioningConfiguration.Builder() |
| .withoutIPv4() |
| .withoutIpReachabilityMonitor() |
| .withInitialConfiguration( |
| conf(links(TEST_LOCAL_ADDRESSES), prefixes(TEST_PREFIXES), ips())) |
| .withApfCapabilities(new ApfCapabilities( |
| 4 /* version */, 4096 /* maxProgramSize */, 4 /* format */)) |
| .build(); |
| |
| ipc.startProvisioning(config); |
| final ArgumentCaptor<ApfConfiguration> configCaptor = ArgumentCaptor.forClass( |
| ApfConfiguration.class); |
| verify(mDependencies, timeout(TEST_TIMEOUT_MS)).maybeCreateApfFilter( |
| any(), configCaptor.capture(), any(), any()); |
| |
| return configCaptor.getValue(); |
| } |
| |
| @Test @IgnoreAfter(Build.VERSION_CODES.R) |
| public void testApfConfiguration_R() throws Exception { |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| final ApfConfiguration config = verifyApfFilterCreatedOnStart(ipc); |
| |
| assertEquals(ApfCapabilities.getApfDrop8023Frames(), config.ieee802_3Filter); |
| assertArrayEquals(ApfCapabilities.getApfEtherTypeBlackList(), config.ethTypeBlackList); |
| |
| verify(mResources, never()).getBoolean(R.bool.config_apfDrop802_3Frames); |
| verify(mResources, never()).getIntArray(R.array.config_apfEthTypeDenyList); |
| |
| verifyShutdown(ipc); |
| } |
| |
| @Test @IgnoreUpTo(Build.VERSION_CODES.R) |
| public void testApfConfiguration() throws Exception { |
| doReturn(true).when(mResources).getBoolean(R.bool.config_apfDrop802_3Frames); |
| final int[] ethTypeDenyList = new int[] { 0x88A2, 0x88A4 }; |
| doReturn(ethTypeDenyList).when(mResources).getIntArray( |
| R.array.config_apfEthTypeDenyList); |
| |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| final ApfConfiguration config = verifyApfFilterCreatedOnStart(ipc); |
| |
| assertTrue(config.ieee802_3Filter); |
| assertArrayEquals(ethTypeDenyList, config.ethTypeBlackList); |
| |
| verifyShutdown(ipc); |
| } |
| |
| @Test @IgnoreUpTo(Build.VERSION_CODES.R) |
| public void testApfConfiguration_NoApfDrop8023Frames() throws Exception { |
| doReturn(false).when(mResources).getBoolean(R.bool.config_apfDrop802_3Frames); |
| final int[] ethTypeDenyList = new int[] { 0x88A3, 0x88A5 }; |
| doReturn(ethTypeDenyList).when(mResources).getIntArray( |
| R.array.config_apfEthTypeDenyList); |
| |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| final ApfConfiguration config = verifyApfFilterCreatedOnStart(ipc); |
| |
| assertFalse(config.ieee802_3Filter); |
| assertArrayEquals(ethTypeDenyList, config.ethTypeBlackList); |
| |
| verifyShutdown(ipc); |
| } |
| |
| private ScanResultInfo makeScanResultInfo(final String ssid, final String bssid) { |
| final ByteBuffer payload = ByteBuffer.allocate(14 /* oui + type + data */); |
| final byte[] data = new byte[10]; |
| new Random().nextBytes(data); |
| payload.put(new byte[] { 0x00, 0x1A, 0x11 }); |
| payload.put((byte) 0x06); |
| payload.put(data); |
| |
| final ScanResultInfo.InformationElement ie = |
| new ScanResultInfo.InformationElement(0xdd /* IE id */, payload); |
| return new ScanResultInfo(ssid, bssid, Collections.singletonList(ie)); |
| } |
| |
| @Test |
| public void testGetInitialBssidOnSOrAbove() throws Exception { |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| final Layer2Information layer2Info = new Layer2Information(TEST_L2KEY, TEST_CLUSTER, |
| MacAddress.fromString(TEST_BSSID)); |
| final ScanResultInfo scanResultInfo = makeScanResultInfo(TEST_SSID, TEST_BSSID2); |
| final MacAddress bssid = ipc.getInitialBssid(layer2Info, scanResultInfo, |
| true /* isAtLeastS */); |
| assertEquals(bssid, MacAddress.fromString(TEST_BSSID)); |
| } |
| |
| @Test |
| public void testGetInitialBssidOnSOrAbove_NullScanReqsultInfo() throws Exception { |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| final Layer2Information layer2Info = new Layer2Information(TEST_L2KEY, TEST_CLUSTER, |
| MacAddress.fromString(TEST_BSSID)); |
| final MacAddress bssid = ipc.getInitialBssid(layer2Info, null /* ScanResultInfo */, |
| true /* isAtLeastS */); |
| assertEquals(bssid, MacAddress.fromString(TEST_BSSID)); |
| } |
| |
| @Test |
| public void testGetInitialBssidOnSOrAbove_NullBssid() throws Exception { |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| final Layer2Information layer2Info = new Layer2Information(TEST_L2KEY, TEST_CLUSTER, |
| null /* bssid */); |
| final ScanResultInfo scanResultInfo = makeScanResultInfo(TEST_SSID, TEST_BSSID); |
| final MacAddress bssid = ipc.getInitialBssid(layer2Info, scanResultInfo, |
| true /* isAtLeastS */); |
| assertNull(bssid); |
| } |
| |
| @Test |
| public void testGetInitialBssidOnSOrAbove_NullLayer2Info() throws Exception { |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| final ScanResultInfo scanResultInfo = makeScanResultInfo(TEST_SSID, TEST_BSSID); |
| final MacAddress bssid = ipc.getInitialBssid(null /* layer2Info */, scanResultInfo, |
| true /* isAtLeastS */); |
| assertNull(bssid); |
| } |
| |
| @Test |
| public void testGetInitialBssidBeforeS() throws Exception { |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| final Layer2Information layer2Info = new Layer2Information(TEST_L2KEY, TEST_CLUSTER, |
| MacAddress.fromString(TEST_BSSID2)); |
| final ScanResultInfo scanResultInfo = makeScanResultInfo(TEST_SSID, TEST_BSSID); |
| final MacAddress bssid = ipc.getInitialBssid(layer2Info, scanResultInfo, |
| false /* isAtLeastS */); |
| assertEquals(bssid, MacAddress.fromString(TEST_BSSID)); |
| } |
| |
| @Test |
| public void testGetInitialBssidBeforeS_NullLayer2Info() throws Exception { |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| final ScanResultInfo scanResultInfo = makeScanResultInfo(TEST_SSID, TEST_BSSID); |
| final MacAddress bssid = ipc.getInitialBssid(null /* layer2Info */, scanResultInfo, |
| false /* isAtLeastS */); |
| assertEquals(bssid, MacAddress.fromString(TEST_BSSID)); |
| } |
| |
| @Test |
| public void testGetInitialBssidBeforeS_BrokenInitialBssid() throws Exception { |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| final ScanResultInfo scanResultInfo = makeScanResultInfo(TEST_SSID, "00:11:22:33:44:"); |
| final MacAddress bssid = ipc.getInitialBssid(null /* layer2Info */, scanResultInfo, |
| false /* isAtLeastS */); |
| assertNull(bssid); |
| } |
| |
| @Test |
| public void testGetInitialBssidBeforeS_BrokenInitialBssidFallback() throws Exception { |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| final Layer2Information layer2Info = new Layer2Information(TEST_L2KEY, TEST_CLUSTER, |
| MacAddress.fromString(TEST_BSSID)); |
| final ScanResultInfo scanResultInfo = makeScanResultInfo(TEST_SSID, "00:11:22:33:44:"); |
| final MacAddress bssid = ipc.getInitialBssid(layer2Info, scanResultInfo, |
| false /* isAtLeastS */); |
| assertEquals(bssid, MacAddress.fromString(TEST_BSSID)); |
| } |
| |
| @Test |
| public void testGetInitialBssidBeforeS_NullScanResultInfoFallback() throws Exception { |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| final Layer2Information layer2Info = new Layer2Information(TEST_L2KEY, TEST_CLUSTER, |
| MacAddress.fromString(TEST_BSSID)); |
| final MacAddress bssid = ipc.getInitialBssid(layer2Info, null /* scanResultInfo */, |
| false /* isAtLeastS */); |
| assertEquals(bssid, MacAddress.fromString(TEST_BSSID)); |
| } |
| |
| @Test |
| public void testGetInitialBssidBeforeS_NullScanResultInfoAndLayer2Info() throws Exception { |
| final IpClient ipc = makeIpClient(TEST_IFNAME); |
| final MacAddress bssid = ipc.getInitialBssid(null /* layer2Info */, |
| null /* scanResultInfo */, false /* isAtLeastS */); |
| assertNull(bssid); |
| } |
| |
| interface Fn<A,B> { |
| B call(A a) throws Exception; |
| } |
| |
| @Test |
| public void testAll() { |
| List<String> list1 = Arrays.asList(); |
| List<String> list2 = Arrays.asList("foo"); |
| List<String> list3 = Arrays.asList("bar", "baz"); |
| List<String> list4 = Arrays.asList("foo", "bar", "baz"); |
| |
| assertTrue(InitialConfiguration.all(list1, (x) -> false)); |
| assertFalse(InitialConfiguration.all(list2, (x) -> false)); |
| assertTrue(InitialConfiguration.all(list3, (x) -> true)); |
| assertTrue(InitialConfiguration.all(list2, (x) -> x.charAt(0) == 'f')); |
| assertFalse(InitialConfiguration.all(list4, (x) -> x.charAt(0) == 'f')); |
| } |
| |
| @Test |
| public void testAny() { |
| List<String> list1 = Arrays.asList(); |
| List<String> list2 = Arrays.asList("foo"); |
| List<String> list3 = Arrays.asList("bar", "baz"); |
| List<String> list4 = Arrays.asList("foo", "bar", "baz"); |
| |
| assertFalse(InitialConfiguration.any(list1, (x) -> true)); |
| assertTrue(InitialConfiguration.any(list2, (x) -> true)); |
| assertTrue(InitialConfiguration.any(list2, (x) -> x.charAt(0) == 'f')); |
| assertFalse(InitialConfiguration.any(list3, (x) -> x.charAt(0) == 'f')); |
| assertTrue(InitialConfiguration.any(list4, (x) -> x.charAt(0) == 'f')); |
| } |
| |
| @Test |
| public void testFindAll() { |
| List<String> list1 = Arrays.asList(); |
| List<String> list2 = Arrays.asList("foo"); |
| List<String> list3 = Arrays.asList("foo", "bar", "baz"); |
| |
| assertEquals(list1, IpClient.findAll(list1, (x) -> true)); |
| assertEquals(list1, IpClient.findAll(list3, (x) -> false)); |
| assertEquals(list3, IpClient.findAll(list3, (x) -> true)); |
| assertEquals(list2, IpClient.findAll(list3, (x) -> x.charAt(0) == 'f')); |
| } |
| } |