Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2016 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 17 | package android.net.ip; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 18 | |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 19 | import static android.net.INetd.IF_STATE_UP; |
markchien | 9e44cde | 2019-12-25 19:40:32 +0800 | [diff] [blame^] | 20 | import static android.net.TetheringManager.TETHERING_BLUETOOTH; |
| 21 | import static android.net.TetheringManager.TETHERING_USB; |
| 22 | import static android.net.TetheringManager.TETHERING_WIFI; |
| 23 | import static android.net.TetheringManager.TETHERING_WIFI_P2P; |
| 24 | import static android.net.TetheringManager.TETHER_ERROR_ENABLE_NAT_ERROR; |
| 25 | import static android.net.TetheringManager.TETHER_ERROR_NO_ERROR; |
| 26 | import static android.net.TetheringManager.TETHER_ERROR_TETHER_IFACE_ERROR; |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 27 | import static android.net.dhcp.IDhcpServer.STATUS_SUCCESS; |
Remi NGUYEN VAN | 73105e11 | 2018-12-21 16:17:09 +0900 | [diff] [blame] | 28 | import static android.net.ip.IpServer.STATE_AVAILABLE; |
Jimmy Chen | bcd86d0 | 2019-07-15 18:03:23 +0800 | [diff] [blame] | 29 | import static android.net.ip.IpServer.STATE_LOCAL_ONLY; |
Remi NGUYEN VAN | 73105e11 | 2018-12-21 16:17:09 +0900 | [diff] [blame] | 30 | import static android.net.ip.IpServer.STATE_TETHERED; |
| 31 | import static android.net.ip.IpServer.STATE_UNAVAILABLE; |
Remi NGUYEN VAN | e88516f | 2019-01-20 09:35:10 +0900 | [diff] [blame] | 32 | import static android.net.shared.Inet4AddressUtils.intToInet4AddressHTH; |
Remi NGUYEN VAN | 73105e11 | 2018-12-21 16:17:09 +0900 | [diff] [blame] | 33 | |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 34 | import static org.junit.Assert.assertEquals; |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 35 | import static org.junit.Assert.assertFalse; |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 36 | import static org.junit.Assert.assertNotNull; |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 37 | import static org.junit.Assert.assertTrue; |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 38 | import static org.junit.Assert.fail; |
Remi NGUYEN VAN | d1b51a3 | 2019-01-22 16:13:57 +0900 | [diff] [blame] | 39 | import static org.mockito.ArgumentMatchers.argThat; |
Erik Kline | ab6439b | 2017-06-06 19:24:21 +0900 | [diff] [blame] | 40 | import static org.mockito.Matchers.any; |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 41 | import static org.mockito.Matchers.anyString; |
Erik Kline | ab6439b | 2017-06-06 19:24:21 +0900 | [diff] [blame] | 42 | import static org.mockito.Matchers.eq; |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 43 | import static org.mockito.Mockito.doAnswer; |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 44 | import static org.mockito.Mockito.doThrow; |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 45 | import static org.mockito.Mockito.inOrder; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 46 | import static org.mockito.Mockito.never; |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 47 | import static org.mockito.Mockito.reset; |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 48 | import static org.mockito.Mockito.timeout; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 49 | import static org.mockito.Mockito.times; |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 50 | import static org.mockito.Mockito.verify; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 51 | import static org.mockito.Mockito.verifyNoMoreInteractions; |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 52 | import static org.mockito.Mockito.when; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 53 | |
Remi NGUYEN VAN | d1b51a3 | 2019-01-22 16:13:57 +0900 | [diff] [blame] | 54 | import android.net.INetd; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 55 | import android.net.INetworkStatsService; |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 56 | import android.net.InterfaceConfigurationParcel; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 57 | import android.net.IpPrefix; |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 58 | import android.net.LinkAddress; |
Erik Kline | ab6439b | 2017-06-06 19:24:21 +0900 | [diff] [blame] | 59 | import android.net.LinkProperties; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 60 | import android.net.MacAddress; |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 61 | import android.net.RouteInfo; |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 62 | import android.net.dhcp.DhcpServingParamsParcel; |
| 63 | import android.net.dhcp.IDhcpServer; |
| 64 | import android.net.dhcp.IDhcpServerCallbacks; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 65 | import android.net.util.InterfaceParams; |
Remi NGUYEN VAN | 25a7e4f | 2018-03-09 14:07:18 +0900 | [diff] [blame] | 66 | import android.net.util.InterfaceSet; |
Erik Kline | 7747fd4 | 2017-05-12 16:52:48 +0900 | [diff] [blame] | 67 | import android.net.util.SharedLog; |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 68 | import android.os.RemoteException; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 69 | import android.os.test.TestLooper; |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 70 | import android.text.TextUtils; |
| 71 | |
Brett Chabot | 1ae2aa6 | 2019-03-04 14:14:56 -0800 | [diff] [blame] | 72 | import androidx.test.filters.SmallTest; |
| 73 | import androidx.test.runner.AndroidJUnit4; |
| 74 | |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 75 | import org.junit.Before; |
| 76 | import org.junit.Test; |
Christopher Wiley | 9bc0df2 | 2016-05-25 13:57:27 -0700 | [diff] [blame] | 77 | import org.junit.runner.RunWith; |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 78 | import org.mockito.ArgumentCaptor; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 79 | import org.mockito.Captor; |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 80 | import org.mockito.InOrder; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 81 | import org.mockito.Mock; |
| 82 | import org.mockito.MockitoAnnotations; |
| 83 | |
Remi NGUYEN VAN | 73105e11 | 2018-12-21 16:17:09 +0900 | [diff] [blame] | 84 | import java.net.Inet4Address; |
| 85 | |
Christopher Wiley | 9bc0df2 | 2016-05-25 13:57:27 -0700 | [diff] [blame] | 86 | @RunWith(AndroidJUnit4.class) |
| 87 | @SmallTest |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 88 | public class IpServerTest { |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 89 | private static final String IFACE_NAME = "testnet1"; |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 90 | private static final String UPSTREAM_IFACE = "upstream0"; |
| 91 | private static final String UPSTREAM_IFACE2 = "upstream1"; |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 92 | private static final String BLUETOOTH_IFACE_ADDR = "192.168.42.1"; |
| 93 | private static final int BLUETOOTH_DHCP_PREFIX_LENGTH = 24; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 94 | private static final int DHCP_LEASE_TIME_SECS = 3600; |
| 95 | |
| 96 | private static final InterfaceParams TEST_IFACE_PARAMS = new InterfaceParams( |
| 97 | IFACE_NAME, 42 /* index */, MacAddress.ALL_ZEROS_ADDRESS, 1500 /* defaultMtu */); |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 98 | |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 99 | private static final int MAKE_DHCPSERVER_TIMEOUT_MS = 1000; |
| 100 | |
Remi NGUYEN VAN | d1b51a3 | 2019-01-22 16:13:57 +0900 | [diff] [blame] | 101 | @Mock private INetd mNetd; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 102 | @Mock private INetworkStatsService mStatsService; |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 103 | @Mock private IpServer.Callback mCallback; |
Erik Kline | 7747fd4 | 2017-05-12 16:52:48 +0900 | [diff] [blame] | 104 | @Mock private SharedLog mSharedLog; |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 105 | @Mock private IDhcpServer mDhcpServer; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 106 | @Mock private RouterAdvertisementDaemon mRaDaemon; |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 107 | @Mock private IpServer.Dependencies mDependencies; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 108 | |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 109 | @Captor private ArgumentCaptor<DhcpServingParamsParcel> mDhcpParamsCaptor; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 110 | |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 111 | private final TestLooper mLooper = new TestLooper(); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 112 | private final ArgumentCaptor<LinkProperties> mLinkPropertiesCaptor = |
| 113 | ArgumentCaptor.forClass(LinkProperties.class); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 114 | private IpServer mIpServer; |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 115 | private InterfaceConfigurationParcel mInterfaceConfiguration; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 116 | |
Christopher Wiley | cd0cfbb | 2016-05-31 14:43:08 -0700 | [diff] [blame] | 117 | private void initStateMachine(int interfaceType) throws Exception { |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 118 | initStateMachine(interfaceType, false /* usingLegacyDhcp */); |
| 119 | } |
| 120 | |
| 121 | private void initStateMachine(int interfaceType, boolean usingLegacyDhcp) throws Exception { |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 122 | doAnswer(inv -> { |
| 123 | final IDhcpServerCallbacks cb = inv.getArgument(2); |
| 124 | new Thread(() -> { |
| 125 | try { |
| 126 | cb.onDhcpServerCreated(STATUS_SUCCESS, mDhcpServer); |
| 127 | } catch (RemoteException e) { |
| 128 | fail(e.getMessage()); |
| 129 | } |
| 130 | }).run(); |
| 131 | return null; |
| 132 | }).when(mDependencies).makeDhcpServer(any(), mDhcpParamsCaptor.capture(), any()); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 133 | when(mDependencies.getRouterAdvertisementDaemon(any())).thenReturn(mRaDaemon); |
| 134 | when(mDependencies.getInterfaceParams(IFACE_NAME)).thenReturn(TEST_IFACE_PARAMS); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 135 | mInterfaceConfiguration = new InterfaceConfigurationParcel(); |
| 136 | mInterfaceConfiguration.flags = new String[0]; |
| 137 | if (interfaceType == TETHERING_BLUETOOTH) { |
| 138 | mInterfaceConfiguration.ipv4Addr = BLUETOOTH_IFACE_ADDR; |
| 139 | mInterfaceConfiguration.prefixLength = BLUETOOTH_DHCP_PREFIX_LENGTH; |
| 140 | } |
Remi NGUYEN VAN | d1b51a3 | 2019-01-22 16:13:57 +0900 | [diff] [blame] | 141 | mIpServer = new IpServer( |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 142 | IFACE_NAME, mLooper.getLooper(), interfaceType, mSharedLog, mNetd, mStatsService, |
| 143 | mCallback, usingLegacyDhcp, mDependencies); |
Remi NGUYEN VAN | d1b51a3 | 2019-01-22 16:13:57 +0900 | [diff] [blame] | 144 | mIpServer.start(); |
| 145 | // Starting the state machine always puts us in a consistent state and notifies |
| 146 | // the rest of the world that we've changed from an unknown to available state. |
| 147 | mLooper.dispatchAll(); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 148 | reset(mNetd, mStatsService, mCallback); |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 149 | |
| 150 | when(mRaDaemon.start()).thenReturn(true); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 151 | } |
| 152 | |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 153 | private void initTetheredStateMachine(int interfaceType, String upstreamIface) |
| 154 | throws Exception { |
| 155 | initTetheredStateMachine(interfaceType, upstreamIface, false); |
| 156 | } |
| 157 | |
| 158 | private void initTetheredStateMachine(int interfaceType, String upstreamIface, |
| 159 | boolean usingLegacyDhcp) throws Exception { |
| 160 | initStateMachine(interfaceType, usingLegacyDhcp); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 161 | dispatchCommand(IpServer.CMD_TETHER_REQUESTED, STATE_TETHERED); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 162 | if (upstreamIface != null) { |
| 163 | dispatchTetherConnectionChanged(upstreamIface); |
| 164 | } |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 165 | reset(mNetd, mStatsService, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 166 | } |
| 167 | |
Christopher Wiley | e90e0a7 | 2016-05-31 10:44:35 -0700 | [diff] [blame] | 168 | @Before public void setUp() throws Exception { |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 169 | MockitoAnnotations.initMocks(this); |
Erik Kline | 7747fd4 | 2017-05-12 16:52:48 +0900 | [diff] [blame] | 170 | when(mSharedLog.forSubComponent(anyString())).thenReturn(mSharedLog); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 171 | } |
| 172 | |
| 173 | @Test |
| 174 | public void startsOutAvailable() { |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 175 | mIpServer = new IpServer(IFACE_NAME, mLooper.getLooper(), TETHERING_BLUETOOTH, mSharedLog, |
| 176 | mNetd, mStatsService, mCallback, false /* usingLegacyDhcp */, mDependencies); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 177 | mIpServer.start(); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 178 | mLooper.dispatchAll(); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 179 | verify(mCallback).updateInterfaceState( |
| 180 | mIpServer, STATE_AVAILABLE, TETHER_ERROR_NO_ERROR); |
| 181 | verify(mCallback).updateLinkProperties(eq(mIpServer), any(LinkProperties.class)); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 182 | verifyNoMoreInteractions(mCallback, mNetd, mStatsService); |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 183 | } |
| 184 | |
| 185 | @Test |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 186 | public void shouldDoNothingUntilRequested() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 187 | initStateMachine(TETHERING_BLUETOOTH); |
markchien | 08cc030 | 2019-09-09 20:50:49 +0800 | [diff] [blame] | 188 | final int [] noOp_commands = { |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 189 | IpServer.CMD_TETHER_UNREQUESTED, |
| 190 | IpServer.CMD_IP_FORWARDING_ENABLE_ERROR, |
| 191 | IpServer.CMD_IP_FORWARDING_DISABLE_ERROR, |
| 192 | IpServer.CMD_START_TETHERING_ERROR, |
| 193 | IpServer.CMD_STOP_TETHERING_ERROR, |
| 194 | IpServer.CMD_SET_DNS_FORWARDERS_ERROR, |
| 195 | IpServer.CMD_TETHER_CONNECTION_CHANGED |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 196 | }; |
markchien | 08cc030 | 2019-09-09 20:50:49 +0800 | [diff] [blame] | 197 | for (int command : noOp_commands) { |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 198 | // None of these commands should trigger us to request action from |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 199 | // the rest of the system. |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 200 | dispatchCommand(command); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 201 | verifyNoMoreInteractions(mNetd, mStatsService, mCallback); |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 202 | } |
| 203 | } |
| 204 | |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 205 | @Test |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 206 | public void handlesImmediateInterfaceDown() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 207 | initStateMachine(TETHERING_BLUETOOTH); |
Christopher Wiley | e90e0a7 | 2016-05-31 10:44:35 -0700 | [diff] [blame] | 208 | |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 209 | dispatchCommand(IpServer.CMD_INTERFACE_DOWN); |
| 210 | verify(mCallback).updateInterfaceState( |
| 211 | mIpServer, STATE_UNAVAILABLE, TETHER_ERROR_NO_ERROR); |
| 212 | verify(mCallback).updateLinkProperties(eq(mIpServer), any(LinkProperties.class)); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 213 | verifyNoMoreInteractions(mNetd, mStatsService, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 214 | } |
| 215 | |
| 216 | @Test |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 217 | public void canBeTethered() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 218 | initStateMachine(TETHERING_BLUETOOTH); |
Christopher Wiley | e90e0a7 | 2016-05-31 10:44:35 -0700 | [diff] [blame] | 219 | |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 220 | dispatchCommand(IpServer.CMD_TETHER_REQUESTED, STATE_TETHERED); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 221 | InOrder inOrder = inOrder(mCallback, mNetd); |
| 222 | inOrder.verify(mNetd).tetherInterfaceAdd(IFACE_NAME); |
| 223 | inOrder.verify(mNetd).networkAddInterface(INetd.LOCAL_NET_ID, IFACE_NAME); |
| 224 | // One for ipv4 route, one for ipv6 link local route. |
| 225 | inOrder.verify(mNetd, times(2)).networkAddRoute(eq(INetd.LOCAL_NET_ID), eq(IFACE_NAME), |
| 226 | any(), any()); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 227 | inOrder.verify(mCallback).updateInterfaceState( |
| 228 | mIpServer, STATE_TETHERED, TETHER_ERROR_NO_ERROR); |
| 229 | inOrder.verify(mCallback).updateLinkProperties( |
| 230 | eq(mIpServer), any(LinkProperties.class)); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 231 | verifyNoMoreInteractions(mNetd, mStatsService, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 232 | } |
| 233 | |
| 234 | @Test |
| 235 | public void canUnrequestTethering() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 236 | initTetheredStateMachine(TETHERING_BLUETOOTH, null); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 237 | |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 238 | dispatchCommand(IpServer.CMD_TETHER_UNREQUESTED); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 239 | InOrder inOrder = inOrder(mNetd, mStatsService, mCallback); |
| 240 | inOrder.verify(mNetd).tetherApplyDnsInterfaces(); |
| 241 | inOrder.verify(mNetd).tetherInterfaceRemove(IFACE_NAME); |
| 242 | inOrder.verify(mNetd).networkRemoveInterface(INetd.LOCAL_NET_ID, IFACE_NAME); |
Remi NGUYEN VAN | d1b51a3 | 2019-01-22 16:13:57 +0900 | [diff] [blame] | 243 | inOrder.verify(mNetd).interfaceSetCfg(argThat(cfg -> IFACE_NAME.equals(cfg.ifName))); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 244 | inOrder.verify(mCallback).updateInterfaceState( |
| 245 | mIpServer, STATE_AVAILABLE, TETHER_ERROR_NO_ERROR); |
| 246 | inOrder.verify(mCallback).updateLinkProperties( |
| 247 | eq(mIpServer), any(LinkProperties.class)); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 248 | verifyNoMoreInteractions(mNetd, mStatsService, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 249 | } |
| 250 | |
| 251 | @Test |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 252 | public void canBeTetheredAsUsb() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 253 | initStateMachine(TETHERING_USB); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 254 | |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 255 | dispatchCommand(IpServer.CMD_TETHER_REQUESTED, STATE_TETHERED); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 256 | InOrder inOrder = inOrder(mCallback, mNetd); |
| 257 | inOrder.verify(mNetd).interfaceSetCfg(argThat(cfg -> |
| 258 | IFACE_NAME.equals(cfg.ifName) && assertContainsFlag(cfg.flags, IF_STATE_UP))); |
| 259 | inOrder.verify(mNetd).tetherInterfaceAdd(IFACE_NAME); |
| 260 | inOrder.verify(mNetd).networkAddInterface(INetd.LOCAL_NET_ID, IFACE_NAME); |
| 261 | inOrder.verify(mNetd, times(2)).networkAddRoute(eq(INetd.LOCAL_NET_ID), eq(IFACE_NAME), |
| 262 | any(), any()); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 263 | inOrder.verify(mCallback).updateInterfaceState( |
| 264 | mIpServer, STATE_TETHERED, TETHER_ERROR_NO_ERROR); |
| 265 | inOrder.verify(mCallback).updateLinkProperties( |
| 266 | eq(mIpServer), mLinkPropertiesCaptor.capture()); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 267 | assertIPv4AddressAndDirectlyConnectedRoute(mLinkPropertiesCaptor.getValue()); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 268 | verifyNoMoreInteractions(mNetd, mStatsService, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 269 | } |
| 270 | |
| 271 | @Test |
Jimmy Chen | bcd86d0 | 2019-07-15 18:03:23 +0800 | [diff] [blame] | 272 | public void canBeTetheredAsWifiP2p() throws Exception { |
| 273 | initStateMachine(TETHERING_WIFI_P2P); |
| 274 | |
| 275 | dispatchCommand(IpServer.CMD_TETHER_REQUESTED, STATE_LOCAL_ONLY); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 276 | InOrder inOrder = inOrder(mCallback, mNetd); |
| 277 | inOrder.verify(mNetd).interfaceSetCfg(argThat(cfg -> |
| 278 | IFACE_NAME.equals(cfg.ifName) && assertContainsFlag(cfg.flags, IF_STATE_UP))); |
| 279 | inOrder.verify(mNetd).tetherInterfaceAdd(IFACE_NAME); |
| 280 | inOrder.verify(mNetd).networkAddInterface(INetd.LOCAL_NET_ID, IFACE_NAME); |
| 281 | inOrder.verify(mNetd, times(2)).networkAddRoute(eq(INetd.LOCAL_NET_ID), eq(IFACE_NAME), |
| 282 | any(), any()); |
Jimmy Chen | bcd86d0 | 2019-07-15 18:03:23 +0800 | [diff] [blame] | 283 | inOrder.verify(mCallback).updateInterfaceState( |
| 284 | mIpServer, STATE_LOCAL_ONLY, TETHER_ERROR_NO_ERROR); |
| 285 | inOrder.verify(mCallback).updateLinkProperties( |
| 286 | eq(mIpServer), mLinkPropertiesCaptor.capture()); |
| 287 | assertIPv4AddressAndDirectlyConnectedRoute(mLinkPropertiesCaptor.getValue()); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 288 | verifyNoMoreInteractions(mNetd, mStatsService, mCallback); |
Jimmy Chen | bcd86d0 | 2019-07-15 18:03:23 +0800 | [diff] [blame] | 289 | } |
| 290 | |
| 291 | @Test |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 292 | public void handlesFirstUpstreamChange() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 293 | initTetheredStateMachine(TETHERING_BLUETOOTH, null); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 294 | |
Erik Kline | ab6439b | 2017-06-06 19:24:21 +0900 | [diff] [blame] | 295 | // Telling the state machine about its upstream interface triggers |
| 296 | // a little more configuration. |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 297 | dispatchTetherConnectionChanged(UPSTREAM_IFACE); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 298 | InOrder inOrder = inOrder(mNetd); |
| 299 | inOrder.verify(mNetd).tetherAddForward(IFACE_NAME, UPSTREAM_IFACE); |
| 300 | inOrder.verify(mNetd).ipfwdAddInterfaceForward(IFACE_NAME, UPSTREAM_IFACE); |
| 301 | verifyNoMoreInteractions(mNetd, mStatsService, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 302 | } |
| 303 | |
| 304 | @Test |
| 305 | public void handlesChangingUpstream() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 306 | initTetheredStateMachine(TETHERING_BLUETOOTH, UPSTREAM_IFACE); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 307 | |
| 308 | dispatchTetherConnectionChanged(UPSTREAM_IFACE2); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 309 | InOrder inOrder = inOrder(mNetd, mStatsService); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 310 | inOrder.verify(mStatsService).forceUpdate(); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 311 | inOrder.verify(mNetd).ipfwdRemoveInterfaceForward(IFACE_NAME, UPSTREAM_IFACE); |
| 312 | inOrder.verify(mNetd).tetherRemoveForward(IFACE_NAME, UPSTREAM_IFACE); |
| 313 | inOrder.verify(mNetd).tetherAddForward(IFACE_NAME, UPSTREAM_IFACE2); |
| 314 | inOrder.verify(mNetd).ipfwdAddInterfaceForward(IFACE_NAME, UPSTREAM_IFACE2); |
| 315 | verifyNoMoreInteractions(mNetd, mStatsService, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 316 | } |
| 317 | |
| 318 | @Test |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 319 | public void handlesChangingUpstreamNatFailure() throws Exception { |
| 320 | initTetheredStateMachine(TETHERING_WIFI, UPSTREAM_IFACE); |
| 321 | |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 322 | doThrow(RemoteException.class).when(mNetd).tetherAddForward(IFACE_NAME, UPSTREAM_IFACE2); |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 323 | |
| 324 | dispatchTetherConnectionChanged(UPSTREAM_IFACE2); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 325 | InOrder inOrder = inOrder(mNetd, mStatsService); |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 326 | inOrder.verify(mStatsService).forceUpdate(); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 327 | inOrder.verify(mNetd).ipfwdRemoveInterfaceForward(IFACE_NAME, UPSTREAM_IFACE); |
| 328 | inOrder.verify(mNetd).tetherRemoveForward(IFACE_NAME, UPSTREAM_IFACE); |
| 329 | inOrder.verify(mNetd).tetherAddForward(IFACE_NAME, UPSTREAM_IFACE2); |
Erik Kline | 8ea4548 | 2017-02-13 17:28:53 +0900 | [diff] [blame] | 330 | inOrder.verify(mStatsService).forceUpdate(); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 331 | inOrder.verify(mNetd).ipfwdRemoveInterfaceForward(IFACE_NAME, UPSTREAM_IFACE2); |
| 332 | inOrder.verify(mNetd).tetherRemoveForward(IFACE_NAME, UPSTREAM_IFACE2); |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 333 | } |
| 334 | |
| 335 | @Test |
| 336 | public void handlesChangingUpstreamInterfaceForwardingFailure() throws Exception { |
| 337 | initTetheredStateMachine(TETHERING_WIFI, UPSTREAM_IFACE); |
| 338 | |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 339 | doThrow(RemoteException.class).when(mNetd).ipfwdAddInterfaceForward( |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 340 | IFACE_NAME, UPSTREAM_IFACE2); |
| 341 | |
| 342 | dispatchTetherConnectionChanged(UPSTREAM_IFACE2); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 343 | InOrder inOrder = inOrder(mNetd, mStatsService); |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 344 | inOrder.verify(mStatsService).forceUpdate(); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 345 | inOrder.verify(mNetd).ipfwdRemoveInterfaceForward(IFACE_NAME, UPSTREAM_IFACE); |
| 346 | inOrder.verify(mNetd).tetherRemoveForward(IFACE_NAME, UPSTREAM_IFACE); |
| 347 | inOrder.verify(mNetd).tetherAddForward(IFACE_NAME, UPSTREAM_IFACE2); |
| 348 | inOrder.verify(mNetd).ipfwdAddInterfaceForward(IFACE_NAME, UPSTREAM_IFACE2); |
Erik Kline | 8ea4548 | 2017-02-13 17:28:53 +0900 | [diff] [blame] | 349 | inOrder.verify(mStatsService).forceUpdate(); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 350 | inOrder.verify(mNetd).ipfwdRemoveInterfaceForward(IFACE_NAME, UPSTREAM_IFACE2); |
| 351 | inOrder.verify(mNetd).tetherRemoveForward(IFACE_NAME, UPSTREAM_IFACE2); |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 352 | } |
| 353 | |
| 354 | @Test |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 355 | public void canUnrequestTetheringWithUpstream() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 356 | initTetheredStateMachine(TETHERING_BLUETOOTH, UPSTREAM_IFACE); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 357 | |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 358 | dispatchCommand(IpServer.CMD_TETHER_UNREQUESTED); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 359 | InOrder inOrder = inOrder(mNetd, mStatsService, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 360 | inOrder.verify(mStatsService).forceUpdate(); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 361 | inOrder.verify(mNetd).ipfwdRemoveInterfaceForward(IFACE_NAME, UPSTREAM_IFACE); |
| 362 | inOrder.verify(mNetd).tetherRemoveForward(IFACE_NAME, UPSTREAM_IFACE); |
| 363 | inOrder.verify(mNetd).tetherApplyDnsInterfaces(); |
| 364 | inOrder.verify(mNetd).tetherInterfaceRemove(IFACE_NAME); |
| 365 | inOrder.verify(mNetd).networkRemoveInterface(INetd.LOCAL_NET_ID, IFACE_NAME); |
Remi NGUYEN VAN | d1b51a3 | 2019-01-22 16:13:57 +0900 | [diff] [blame] | 366 | inOrder.verify(mNetd).interfaceSetCfg(argThat(cfg -> IFACE_NAME.equals(cfg.ifName))); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 367 | inOrder.verify(mCallback).updateInterfaceState( |
| 368 | mIpServer, STATE_AVAILABLE, TETHER_ERROR_NO_ERROR); |
| 369 | inOrder.verify(mCallback).updateLinkProperties( |
| 370 | eq(mIpServer), any(LinkProperties.class)); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 371 | verifyNoMoreInteractions(mNetd, mStatsService, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 372 | } |
| 373 | |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 374 | @Test |
| 375 | public void interfaceDownLeadsToUnavailable() throws Exception { |
| 376 | for (boolean shouldThrow : new boolean[]{true, false}) { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 377 | initTetheredStateMachine(TETHERING_USB, null); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 378 | |
| 379 | if (shouldThrow) { |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 380 | doThrow(RemoteException.class).when(mNetd).tetherInterfaceRemove(IFACE_NAME); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 381 | } |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 382 | dispatchCommand(IpServer.CMD_INTERFACE_DOWN); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 383 | InOrder usbTeardownOrder = inOrder(mNetd, mCallback); |
| 384 | // Currently IpServer interfaceSetCfg twice to stop IPv4. One just set interface down |
| 385 | // Another one is set IPv4 to 0.0.0.0/0 as clearng ipv4 address. |
| 386 | usbTeardownOrder.verify(mNetd, times(2)).interfaceSetCfg( |
| 387 | argThat(cfg -> IFACE_NAME.equals(cfg.ifName))); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 388 | usbTeardownOrder.verify(mCallback).updateInterfaceState( |
| 389 | mIpServer, STATE_UNAVAILABLE, TETHER_ERROR_NO_ERROR); |
| 390 | usbTeardownOrder.verify(mCallback).updateLinkProperties( |
| 391 | eq(mIpServer), mLinkPropertiesCaptor.capture()); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 392 | assertNoAddressesNorRoutes(mLinkPropertiesCaptor.getValue()); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 393 | } |
| 394 | } |
| 395 | |
| 396 | @Test |
| 397 | public void usbShouldBeTornDownOnTetherError() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 398 | initStateMachine(TETHERING_USB); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 399 | |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 400 | doThrow(RemoteException.class).when(mNetd).tetherInterfaceAdd(IFACE_NAME); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 401 | dispatchCommand(IpServer.CMD_TETHER_REQUESTED, STATE_TETHERED); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 402 | InOrder usbTeardownOrder = inOrder(mNetd, mCallback); |
| 403 | usbTeardownOrder.verify(mNetd).interfaceSetCfg( |
| 404 | argThat(cfg -> IFACE_NAME.equals(cfg.ifName))); |
| 405 | usbTeardownOrder.verify(mNetd).tetherInterfaceAdd(IFACE_NAME); |
| 406 | |
| 407 | usbTeardownOrder.verify(mNetd, times(2)).interfaceSetCfg( |
| 408 | argThat(cfg -> IFACE_NAME.equals(cfg.ifName))); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 409 | usbTeardownOrder.verify(mCallback).updateInterfaceState( |
| 410 | mIpServer, STATE_AVAILABLE, TETHER_ERROR_TETHER_IFACE_ERROR); |
| 411 | usbTeardownOrder.verify(mCallback).updateLinkProperties( |
| 412 | eq(mIpServer), mLinkPropertiesCaptor.capture()); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 413 | assertNoAddressesNorRoutes(mLinkPropertiesCaptor.getValue()); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 414 | } |
| 415 | |
| 416 | @Test |
| 417 | public void shouldTearDownUsbOnUpstreamError() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 418 | initTetheredStateMachine(TETHERING_USB, null); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 419 | |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 420 | doThrow(RemoteException.class).when(mNetd).tetherAddForward(anyString(), anyString()); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 421 | dispatchTetherConnectionChanged(UPSTREAM_IFACE); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 422 | InOrder usbTeardownOrder = inOrder(mNetd, mCallback); |
| 423 | usbTeardownOrder.verify(mNetd).tetherAddForward(IFACE_NAME, UPSTREAM_IFACE); |
| 424 | |
| 425 | usbTeardownOrder.verify(mNetd, times(2)).interfaceSetCfg( |
| 426 | argThat(cfg -> IFACE_NAME.equals(cfg.ifName))); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 427 | usbTeardownOrder.verify(mCallback).updateInterfaceState( |
| 428 | mIpServer, STATE_AVAILABLE, TETHER_ERROR_ENABLE_NAT_ERROR); |
| 429 | usbTeardownOrder.verify(mCallback).updateLinkProperties( |
| 430 | eq(mIpServer), mLinkPropertiesCaptor.capture()); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 431 | assertNoAddressesNorRoutes(mLinkPropertiesCaptor.getValue()); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 432 | } |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 433 | |
Erik Kline | 624bf3d | 2017-02-14 15:55:00 +0900 | [diff] [blame] | 434 | @Test |
| 435 | public void ignoresDuplicateUpstreamNotifications() throws Exception { |
| 436 | initTetheredStateMachine(TETHERING_WIFI, UPSTREAM_IFACE); |
| 437 | |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 438 | verifyNoMoreInteractions(mNetd, mStatsService, mCallback); |
Erik Kline | 624bf3d | 2017-02-14 15:55:00 +0900 | [diff] [blame] | 439 | |
| 440 | for (int i = 0; i < 5; i++) { |
| 441 | dispatchTetherConnectionChanged(UPSTREAM_IFACE); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 442 | verifyNoMoreInteractions(mNetd, mStatsService, mCallback); |
Erik Kline | 624bf3d | 2017-02-14 15:55:00 +0900 | [diff] [blame] | 443 | } |
| 444 | } |
| 445 | |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 446 | @Test |
| 447 | public void startsDhcpServer() throws Exception { |
| 448 | initTetheredStateMachine(TETHERING_WIFI, UPSTREAM_IFACE); |
| 449 | dispatchTetherConnectionChanged(UPSTREAM_IFACE); |
| 450 | |
| 451 | assertDhcpStarted(new IpPrefix("192.168.43.0/24")); |
| 452 | } |
| 453 | |
| 454 | @Test |
| 455 | public void startsDhcpServerOnBluetooth() throws Exception { |
| 456 | initTetheredStateMachine(TETHERING_BLUETOOTH, UPSTREAM_IFACE); |
| 457 | dispatchTetherConnectionChanged(UPSTREAM_IFACE); |
| 458 | |
| 459 | assertDhcpStarted(new IpPrefix("192.168.44.0/24")); |
| 460 | } |
| 461 | |
| 462 | @Test |
Jimmy Chen | bcd86d0 | 2019-07-15 18:03:23 +0800 | [diff] [blame] | 463 | public void startsDhcpServerOnWifiP2p() throws Exception { |
| 464 | initTetheredStateMachine(TETHERING_WIFI_P2P, UPSTREAM_IFACE); |
| 465 | dispatchTetherConnectionChanged(UPSTREAM_IFACE); |
| 466 | |
| 467 | assertDhcpStarted(new IpPrefix("192.168.49.0/24")); |
| 468 | } |
| 469 | |
| 470 | @Test |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 471 | public void doesNotStartDhcpServerIfDisabled() throws Exception { |
| 472 | initTetheredStateMachine(TETHERING_WIFI, UPSTREAM_IFACE, true /* usingLegacyDhcp */); |
| 473 | dispatchTetherConnectionChanged(UPSTREAM_IFACE); |
| 474 | |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 475 | verify(mDependencies, never()).makeDhcpServer(any(), any(), any()); |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 476 | } |
| 477 | |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 478 | private void assertDhcpStarted(IpPrefix expectedPrefix) throws Exception { |
| 479 | verify(mDependencies, times(1)).makeDhcpServer(eq(IFACE_NAME), any(), any()); |
| 480 | verify(mDhcpServer, timeout(MAKE_DHCPSERVER_TIMEOUT_MS).times(1)).start(any()); |
| 481 | final DhcpServingParamsParcel params = mDhcpParamsCaptor.getValue(); |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 482 | // Last address byte is random |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 483 | assertTrue(expectedPrefix.contains(intToInet4AddressHTH(params.serverAddr))); |
| 484 | assertEquals(expectedPrefix.getPrefixLength(), params.serverAddrPrefixLength); |
| 485 | assertEquals(1, params.defaultRouters.length); |
| 486 | assertEquals(params.serverAddr, params.defaultRouters[0]); |
| 487 | assertEquals(1, params.dnsServers.length); |
| 488 | assertEquals(params.serverAddr, params.dnsServers[0]); |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 489 | assertEquals(DHCP_LEASE_TIME_SECS, params.dhcpLeaseTimeSecs); |
| 490 | } |
| 491 | |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 492 | /** |
| 493 | * Send a command to the state machine under test, and run the event loop to idle. |
| 494 | * |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 495 | * @param command One of the IpServer.CMD_* constants. |
Remi NGUYEN VAN | a911e84 | 2018-03-15 11:57:14 +0900 | [diff] [blame] | 496 | * @param arg1 An additional argument to pass. |
Erik Kline | ea9cc48 | 2017-03-10 19:35:34 +0900 | [diff] [blame] | 497 | */ |
| 498 | private void dispatchCommand(int command, int arg1) { |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 499 | mIpServer.sendMessage(command, arg1); |
Erik Kline | ea9cc48 | 2017-03-10 19:35:34 +0900 | [diff] [blame] | 500 | mLooper.dispatchAll(); |
| 501 | } |
| 502 | |
| 503 | /** |
| 504 | * Send a command to the state machine under test, and run the event loop to idle. |
| 505 | * |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 506 | * @param command One of the IpServer.CMD_* constants. |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 507 | */ |
| 508 | private void dispatchCommand(int command) { |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 509 | mIpServer.sendMessage(command); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 510 | mLooper.dispatchAll(); |
| 511 | } |
| 512 | |
| 513 | /** |
| 514 | * Special override to tell the state machine that the upstream interface has changed. |
| 515 | * |
| 516 | * @see #dispatchCommand(int) |
| 517 | * @param upstreamIface String name of upstream interface (or null) |
| 518 | */ |
| 519 | private void dispatchTetherConnectionChanged(String upstreamIface) { |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 520 | mIpServer.sendMessage(IpServer.CMD_TETHER_CONNECTION_CHANGED, |
Remi NGUYEN VAN | 25a7e4f | 2018-03-09 14:07:18 +0900 | [diff] [blame] | 521 | new InterfaceSet(upstreamIface)); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 522 | mLooper.dispatchAll(); |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 523 | } |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 524 | |
| 525 | private void assertIPv4AddressAndDirectlyConnectedRoute(LinkProperties lp) { |
| 526 | // Find the first IPv4 LinkAddress. |
| 527 | LinkAddress addr4 = null; |
| 528 | for (LinkAddress addr : lp.getLinkAddresses()) { |
| 529 | if (!(addr.getAddress() instanceof Inet4Address)) continue; |
| 530 | addr4 = addr; |
| 531 | break; |
| 532 | } |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 533 | assertNotNull("missing IPv4 address", addr4); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 534 | |
markchien | 986750b | 2019-12-06 15:24:53 +0800 | [diff] [blame] | 535 | final IpPrefix destination = new IpPrefix(addr4.getAddress(), addr4.getPrefixLength()); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 536 | // Assert the presence of the associated directly connected route. |
markchien | 986750b | 2019-12-06 15:24:53 +0800 | [diff] [blame] | 537 | final RouteInfo directlyConnected = new RouteInfo(destination, null, lp.getInterfaceName(), |
| 538 | RouteInfo.RTN_UNICAST); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 539 | assertTrue("missing directly connected route: '" + directlyConnected.toString() + "'", |
| 540 | lp.getRoutes().contains(directlyConnected)); |
| 541 | } |
| 542 | |
| 543 | private void assertNoAddressesNorRoutes(LinkProperties lp) { |
| 544 | assertTrue(lp.getLinkAddresses().isEmpty()); |
| 545 | assertTrue(lp.getRoutes().isEmpty()); |
| 546 | // We also check that interface name is non-empty, because we should |
| 547 | // never see an empty interface name in any LinkProperties update. |
| 548 | assertFalse(TextUtils.isEmpty(lp.getInterfaceName())); |
| 549 | } |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 550 | |
| 551 | private boolean assertContainsFlag(String[] flags, String match) { |
| 552 | for (String flag : flags) { |
| 553 | if (flag.equals(match)) return true; |
| 554 | } |
| 555 | fail("Missing flag: " + match); |
| 556 | return false; |
| 557 | } |
Lorenzo Colitti | 5bce5a1 | 2016-10-28 17:45:55 +0900 | [diff] [blame] | 558 | } |