Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2012 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | package com.android.server; |
| 18 | |
paulhu | 86e23eb | 2019-11-05 18:05:05 +0800 | [diff] [blame] | 19 | import static android.Manifest.permission.CHANGE_NETWORK_STATE; |
| 20 | import static android.Manifest.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS; |
| 21 | import static android.content.pm.PackageInfo.REQUESTED_PERMISSION_GRANTED; |
Rubin Xu | 9e64dc0 | 2019-04-23 18:04:14 +0100 | [diff] [blame] | 22 | import static android.content.pm.PackageManager.GET_PERMISSIONS; |
| 23 | import static android.content.pm.PackageManager.MATCH_ANY_USER; |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 24 | import static android.content.pm.PackageManager.PERMISSION_DENIED; |
| 25 | import static android.content.pm.PackageManager.PERMISSION_GRANTED; |
Remi NGUYEN VAN | 0839a19 | 2019-06-17 11:28:27 +0900 | [diff] [blame] | 26 | import static android.net.ConnectivityManager.ACTION_CAPTIVE_PORTAL_SIGN_IN; |
Erik Kline | f851d6d | 2015-04-20 16:03:48 +0900 | [diff] [blame] | 27 | import static android.net.ConnectivityManager.CONNECTIVITY_ACTION; |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 28 | import static android.net.ConnectivityManager.EXTRA_NETWORK_INFO; |
| 29 | import static android.net.ConnectivityManager.EXTRA_NETWORK_TYPE; |
Lorenzo Colitti | f56ff04 | 2019-02-25 10:56:06 +0900 | [diff] [blame] | 30 | import static android.net.ConnectivityManager.NETID_UNSET; |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 31 | import static android.net.ConnectivityManager.PRIVATE_DNS_MODE_OFF; |
| 32 | import static android.net.ConnectivityManager.PRIVATE_DNS_MODE_OPPORTUNISTIC; |
| 33 | import static android.net.ConnectivityManager.PRIVATE_DNS_MODE_PROVIDER_HOSTNAME; |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 34 | import static android.net.ConnectivityManager.TYPE_ETHERNET; |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 35 | import static android.net.ConnectivityManager.TYPE_MOBILE; |
Lorenzo Colitti | 7bbe3ee | 2017-08-24 22:35:10 +0900 | [diff] [blame] | 36 | import static android.net.ConnectivityManager.TYPE_MOBILE_FOTA; |
| 37 | import static android.net.ConnectivityManager.TYPE_MOBILE_MMS; |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 38 | import static android.net.ConnectivityManager.TYPE_MOBILE_SUPL; |
Lorenzo Colitti | 1cfd6b6 | 2021-01-28 18:31:31 +0900 | [diff] [blame] | 39 | import static android.net.ConnectivityManager.TYPE_VPN; |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 40 | import static android.net.ConnectivityManager.TYPE_WIFI; |
Chiachang Wang | 8ea15c96 | 2019-05-23 16:29:30 +0800 | [diff] [blame] | 41 | import static android.net.INetworkMonitor.NETWORK_VALIDATION_PROBE_DNS; |
| 42 | import static android.net.INetworkMonitor.NETWORK_VALIDATION_PROBE_FALLBACK; |
| 43 | import static android.net.INetworkMonitor.NETWORK_VALIDATION_PROBE_HTTP; |
| 44 | import static android.net.INetworkMonitor.NETWORK_VALIDATION_PROBE_HTTPS; |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 45 | import static android.net.INetworkMonitor.NETWORK_VALIDATION_PROBE_PRIVDNS; |
Chiachang Wang | 8ea15c96 | 2019-05-23 16:29:30 +0800 | [diff] [blame] | 46 | import static android.net.INetworkMonitor.NETWORK_VALIDATION_RESULT_PARTIAL; |
| 47 | import static android.net.INetworkMonitor.NETWORK_VALIDATION_RESULT_VALID; |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 48 | import static android.net.NetworkCapabilities.NET_CAPABILITY_CAPTIVE_PORTAL; |
| 49 | import static android.net.NetworkCapabilities.NET_CAPABILITY_CBS; |
| 50 | import static android.net.NetworkCapabilities.NET_CAPABILITY_DUN; |
| 51 | import static android.net.NetworkCapabilities.NET_CAPABILITY_EIMS; |
| 52 | import static android.net.NetworkCapabilities.NET_CAPABILITY_FOREGROUND; |
| 53 | import static android.net.NetworkCapabilities.NET_CAPABILITY_FOTA; |
| 54 | import static android.net.NetworkCapabilities.NET_CAPABILITY_IA; |
| 55 | import static android.net.NetworkCapabilities.NET_CAPABILITY_IMS; |
| 56 | import static android.net.NetworkCapabilities.NET_CAPABILITY_INTERNET; |
| 57 | import static android.net.NetworkCapabilities.NET_CAPABILITY_MMS; |
| 58 | import static android.net.NetworkCapabilities.NET_CAPABILITY_NOT_METERED; |
| 59 | import static android.net.NetworkCapabilities.NET_CAPABILITY_NOT_RESTRICTED; |
Chalard Jean | 804b8fb | 2018-01-30 22:41:41 +0900 | [diff] [blame] | 60 | import static android.net.NetworkCapabilities.NET_CAPABILITY_NOT_SUSPENDED; |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 61 | import static android.net.NetworkCapabilities.NET_CAPABILITY_NOT_VPN; |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 62 | import static android.net.NetworkCapabilities.NET_CAPABILITY_PARTIAL_CONNECTIVITY; |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 63 | import static android.net.NetworkCapabilities.NET_CAPABILITY_RCS; |
| 64 | import static android.net.NetworkCapabilities.NET_CAPABILITY_SUPL; |
| 65 | import static android.net.NetworkCapabilities.NET_CAPABILITY_TRUSTED; |
| 66 | import static android.net.NetworkCapabilities.NET_CAPABILITY_VALIDATED; |
| 67 | import static android.net.NetworkCapabilities.NET_CAPABILITY_WIFI_P2P; |
| 68 | import static android.net.NetworkCapabilities.NET_CAPABILITY_XCAP; |
| 69 | import static android.net.NetworkCapabilities.TRANSPORT_CELLULAR; |
| 70 | import static android.net.NetworkCapabilities.TRANSPORT_ETHERNET; |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 71 | import static android.net.NetworkCapabilities.TRANSPORT_VPN; |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 72 | import static android.net.NetworkCapabilities.TRANSPORT_WIFI; |
| 73 | import static android.net.NetworkCapabilities.TRANSPORT_WIFI_AWARE; |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 74 | import static android.net.NetworkPolicyManager.RULE_ALLOW_METERED; |
| 75 | import static android.net.NetworkPolicyManager.RULE_NONE; |
| 76 | import static android.net.NetworkPolicyManager.RULE_REJECT_ALL; |
| 77 | import static android.net.NetworkPolicyManager.RULE_REJECT_METERED; |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 78 | import static android.net.RouteInfo.RTN_UNREACHABLE; |
Cody Kesting | 0d8d6ac | 2020-05-12 18:47:10 +0000 | [diff] [blame] | 79 | import static android.os.Process.INVALID_UID; |
Benedict Wong | 5d50ce8 | 2020-01-20 22:14:59 -0800 | [diff] [blame] | 80 | import static android.system.OsConstants.IPPROTO_TCP; |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 81 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 82 | import static com.android.server.ConnectivityServiceTestUtilsKt.transportToLegacyType; |
Chalard Jean | 9c0ff1b | 2019-05-30 17:11:14 +0900 | [diff] [blame] | 83 | import static com.android.testutils.ConcurrentUtilsKt.await; |
| 84 | import static com.android.testutils.ConcurrentUtilsKt.durationOf; |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 85 | import static com.android.testutils.ExceptionUtils.ignoreExceptions; |
Chalard Jean | 9c0ff1b | 2019-05-30 17:11:14 +0900 | [diff] [blame] | 86 | import static com.android.testutils.HandlerUtilsKt.waitForIdleSerialExecutor; |
| 87 | import static com.android.testutils.MiscAssertsKt.assertContainsExactly; |
| 88 | import static com.android.testutils.MiscAssertsKt.assertEmpty; |
| 89 | import static com.android.testutils.MiscAssertsKt.assertLength; |
| 90 | import static com.android.testutils.MiscAssertsKt.assertRunsInAtMost; |
| 91 | import static com.android.testutils.MiscAssertsKt.assertThrows; |
| 92 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 93 | import static org.junit.Assert.assertEquals; |
| 94 | import static org.junit.Assert.assertFalse; |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 95 | import static org.junit.Assert.assertNotEquals; |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 96 | import static org.junit.Assert.assertNotNull; |
| 97 | import static org.junit.Assert.assertNull; |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 98 | import static org.junit.Assert.assertTrue; |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 99 | import static org.junit.Assert.fail; |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 100 | import static org.mockito.ArgumentMatchers.anyLong; |
Remi NGUYEN VAN | 0839a19 | 2019-06-17 11:28:27 +0900 | [diff] [blame] | 101 | import static org.mockito.ArgumentMatchers.anyString; |
Cody Kesting | a3b71c4 | 2020-02-11 10:03:26 -0800 | [diff] [blame] | 102 | import static org.mockito.ArgumentMatchers.argThat; |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 103 | import static org.mockito.ArgumentMatchers.eq; |
Chiachang Wang | 4d2791b | 2020-06-16 01:02:52 +0000 | [diff] [blame] | 104 | import static org.mockito.ArgumentMatchers.isNull; |
Chalard Jean | 587758b | 2019-11-29 16:41:50 +0900 | [diff] [blame] | 105 | import static org.mockito.ArgumentMatchers.startsWith; |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 106 | import static org.mockito.Matchers.anyInt; |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 107 | import static org.mockito.Mockito.any; |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 108 | import static org.mockito.Mockito.atLeastOnce; |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 109 | import static org.mockito.Mockito.doAnswer; |
| 110 | import static org.mockito.Mockito.doNothing; |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 111 | import static org.mockito.Mockito.doReturn; |
Roshan Pius | e38acab | 2020-01-16 12:17:17 -0800 | [diff] [blame] | 112 | import static org.mockito.Mockito.doThrow; |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 113 | import static org.mockito.Mockito.inOrder; |
Jeff Sharkey | 3671b1e | 2013-01-31 17:22:26 -0800 | [diff] [blame] | 114 | import static org.mockito.Mockito.mock; |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 115 | import static org.mockito.Mockito.never; |
| 116 | import static org.mockito.Mockito.reset; |
Lorenzo Colitti | 42cdf57 | 2017-03-21 18:54:11 +0900 | [diff] [blame] | 117 | import static org.mockito.Mockito.spy; |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 118 | import static org.mockito.Mockito.timeout; |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 119 | import static org.mockito.Mockito.times; |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 120 | import static org.mockito.Mockito.verify; |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 121 | import static org.mockito.Mockito.verifyNoMoreInteractions; |
Lorenzo Colitti | 42cdf57 | 2017-03-21 18:54:11 +0900 | [diff] [blame] | 122 | import static org.mockito.Mockito.when; |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 123 | |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 124 | import android.Manifest; |
junyulai | 7c46917 | 2019-01-16 20:23:34 +0800 | [diff] [blame] | 125 | import android.annotation.NonNull; |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 126 | import android.app.AlarmManager; |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 127 | import android.app.AppOpsManager; |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 128 | import android.app.NotificationManager; |
Paul Jensen | bb2e0e9 | 2015-06-16 15:11:58 -0400 | [diff] [blame] | 129 | import android.app.PendingIntent; |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 130 | import android.content.BroadcastReceiver; |
Remi NGUYEN VAN | 91a1cc1 | 2018-09-28 14:33:11 +0900 | [diff] [blame] | 131 | import android.content.ContentProvider; |
Lorenzo Colitti | 6d553f6 | 2016-06-05 02:20:29 +0900 | [diff] [blame] | 132 | import android.content.ContentResolver; |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 133 | import android.content.Context; |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 134 | import android.content.Intent; |
| 135 | import android.content.IntentFilter; |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 136 | import android.content.pm.ApplicationInfo; |
| 137 | import android.content.pm.PackageInfo; |
Rubin Xu | 9e64dc0 | 2019-04-23 18:04:14 +0100 | [diff] [blame] | 138 | import android.content.pm.PackageManager; |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 139 | import android.content.pm.UserInfo; |
Lorenzo Colitti | 42cdf57 | 2017-03-21 18:54:11 +0900 | [diff] [blame] | 140 | import android.content.res.Resources; |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 141 | import android.location.LocationManager; |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 142 | import android.net.CaptivePortalData; |
Benedict Wong | 5d50ce8 | 2020-01-20 22:14:59 -0800 | [diff] [blame] | 143 | import android.net.ConnectionInfo; |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 144 | import android.net.ConnectivityManager; |
| 145 | import android.net.ConnectivityManager.NetworkCallback; |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 146 | import android.net.ConnectivityManager.PacketKeepalive; |
| 147 | import android.net.ConnectivityManager.PacketKeepaliveCallback; |
Hugo Benichi | cb88323 | 2017-05-11 13:16:17 +0900 | [diff] [blame] | 148 | import android.net.ConnectivityManager.TooManyRequestsException; |
Chalard Jean | b72b62d | 2018-02-16 16:08:35 +0900 | [diff] [blame] | 149 | import android.net.ConnectivityThread; |
Remi NGUYEN VAN | 24d8a33 | 2020-04-24 12:19:37 +0000 | [diff] [blame] | 150 | import android.net.DataStallReportParcelable; |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 151 | import android.net.IConnectivityDiagnosticsCallback; |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 152 | import android.net.IDnsResolver; |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 153 | import android.net.IIpConnectivityMetrics; |
Chenbo Feng | 7f14dbc | 2018-11-08 17:36:21 -0800 | [diff] [blame] | 154 | import android.net.INetd; |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 155 | import android.net.INetworkMonitor; |
| 156 | import android.net.INetworkMonitorCallbacks; |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 157 | import android.net.INetworkPolicyListener; |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 158 | import android.net.INetworkPolicyManager; |
| 159 | import android.net.INetworkStatsService; |
Benedict Wong | 5d50ce8 | 2020-01-20 22:14:59 -0800 | [diff] [blame] | 160 | import android.net.InetAddresses; |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 161 | import android.net.InterfaceConfiguration; |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 162 | import android.net.IpPrefix; |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 163 | import android.net.IpSecManager; |
| 164 | import android.net.IpSecManager.UdpEncapsulationSocket; |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 165 | import android.net.LinkAddress; |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 166 | import android.net.LinkProperties; |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 167 | import android.net.MatchAllNetworkSpecifier; |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 168 | import android.net.Network; |
Chiachang Wang | 4d2791b | 2020-06-16 01:02:52 +0000 | [diff] [blame] | 169 | import android.net.NetworkAgent; |
| 170 | import android.net.NetworkAgentConfig; |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 171 | import android.net.NetworkCapabilities; |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 172 | import android.net.NetworkFactory; |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 173 | import android.net.NetworkInfo; |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 174 | import android.net.NetworkInfo.DetailedState; |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 175 | import android.net.NetworkRequest; |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 176 | import android.net.NetworkSpecifier; |
Remi NGUYEN VAN | 0839a19 | 2019-06-17 11:28:27 +0900 | [diff] [blame] | 177 | import android.net.NetworkStack; |
Remi NGUYEN VAN | 5db454c | 2019-02-14 18:04:20 +0900 | [diff] [blame] | 178 | import android.net.NetworkStackClient; |
Varun Anand | d33cbc6 | 2019-02-07 14:13:13 -0800 | [diff] [blame] | 179 | import android.net.NetworkState; |
Remi NGUYEN VAN | 24d8a33 | 2020-04-24 12:19:37 +0000 | [diff] [blame] | 180 | import android.net.NetworkTestResultParcelable; |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 181 | import android.net.NetworkUtils; |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 182 | import android.net.ProxyInfo; |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 183 | import android.net.ResolverParamsParcel; |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 184 | import android.net.RouteInfo; |
Lorenzo Colitti | d86407b | 2020-03-18 07:52:25 +0000 | [diff] [blame] | 185 | import android.net.RouteInfoParcel; |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 186 | import android.net.SocketKeepalive; |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 187 | import android.net.UidRange; |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 188 | import android.net.Uri; |
Benedict Wong | 5d50ce8 | 2020-01-20 22:14:59 -0800 | [diff] [blame] | 189 | import android.net.VpnManager; |
Hugo Benichi | f9fdf87 | 2016-07-28 17:53:06 +0900 | [diff] [blame] | 190 | import android.net.metrics.IpConnectivityLog; |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 191 | import android.net.shared.NetworkMonitorUtils; |
| 192 | import android.net.shared.PrivateDnsConfig; |
Lorenzo Colitti | 58ebe1c | 2017-01-24 09:41:36 +0900 | [diff] [blame] | 193 | import android.net.util.MultinetworkPolicyTracker; |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 194 | import android.os.BadParcelableException; |
Rubin Xu | 9e64dc0 | 2019-04-23 18:04:14 +0100 | [diff] [blame] | 195 | import android.os.Binder; |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 196 | import android.os.Build; |
Remi NGUYEN VAN | 0839a19 | 2019-06-17 11:28:27 +0900 | [diff] [blame] | 197 | import android.os.Bundle; |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 198 | import android.os.ConditionVariable; |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 199 | import android.os.Handler; |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 200 | import android.os.HandlerThread; |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 201 | import android.os.IBinder; |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 202 | import android.os.INetworkManagementService; |
Lorenzo Colitti | e58961a | 2015-08-07 20:17:27 +0900 | [diff] [blame] | 203 | import android.os.Looper; |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 204 | import android.os.Parcel; |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 205 | import android.os.ParcelFileDescriptor; |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 206 | import android.os.Parcelable; |
Robin Lee | d2baf79 | 2016-03-24 12:07:00 +0000 | [diff] [blame] | 207 | import android.os.Process; |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 208 | import android.os.RemoteException; |
Lorenzo Colitti | bfecba2 | 2016-02-21 01:09:26 +0900 | [diff] [blame] | 209 | import android.os.SystemClock; |
Lorenzo Colitti | 4734cdb | 2017-04-27 14:30:21 +0900 | [diff] [blame] | 210 | import android.os.UserHandle; |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 211 | import android.os.UserManager; |
Lorenzo Colitti | 6d553f6 | 2016-06-05 02:20:29 +0900 | [diff] [blame] | 212 | import android.provider.Settings; |
Benedict Wong | b570e86 | 2020-01-17 19:33:55 -0800 | [diff] [blame] | 213 | import android.security.KeyStore; |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 214 | import android.system.Os; |
Hall Liu | ed6d6e6 | 2020-03-26 19:09:30 -0700 | [diff] [blame] | 215 | import android.telephony.TelephonyManager; |
Lorenzo Colitti | 6d553f6 | 2016-06-05 02:20:29 +0900 | [diff] [blame] | 216 | import android.test.mock.MockContentResolver; |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 217 | import android.text.TextUtils; |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 218 | import android.util.ArraySet; |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 219 | import android.util.Log; |
Etan Cohen | ddb720a | 2019-01-08 12:09:18 -0800 | [diff] [blame] | 220 | import android.util.SparseArray; |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 221 | |
Brett Chabot | 1ae2aa6 | 2019-03-04 14:14:56 -0800 | [diff] [blame] | 222 | import androidx.test.InstrumentationRegistry; |
Guang Zhu | b90866d | 2019-09-01 21:37:04 -0700 | [diff] [blame] | 223 | import androidx.test.filters.FlakyTest; |
Brett Chabot | 1ae2aa6 | 2019-03-04 14:14:56 -0800 | [diff] [blame] | 224 | import androidx.test.filters.SmallTest; |
| 225 | import androidx.test.runner.AndroidJUnit4; |
| 226 | |
Chalard Jean | 587758b | 2019-11-29 16:41:50 +0900 | [diff] [blame] | 227 | import com.android.internal.app.IBatteryStats; |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 228 | import com.android.internal.net.VpnConfig; |
Varun Anand | d33cbc6 | 2019-02-07 14:13:13 -0800 | [diff] [blame] | 229 | import com.android.internal.net.VpnInfo; |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 230 | import com.android.internal.util.ArrayUtils; |
Lorenzo Colitti | bfecba2 | 2016-02-21 01:09:26 +0900 | [diff] [blame] | 231 | import com.android.internal.util.WakeupMessage; |
Lorenzo Colitti | 3c295b5 | 2016-10-28 12:56:03 +0900 | [diff] [blame] | 232 | import com.android.internal.util.test.BroadcastInterceptingContext; |
Lorenzo Colitti | b8df76e4 | 2016-10-28 12:37:38 +0900 | [diff] [blame] | 233 | import com.android.internal.util.test.FakeSettingsProvider; |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 234 | import com.android.server.ConnectivityService.ConnectivityDiagnosticsCallbackInfo; |
Chalard Jean | dda156a | 2018-01-10 21:19:32 +0900 | [diff] [blame] | 235 | import com.android.server.connectivity.ConnectivityConstants; |
Hugo Benichi | 64901e5 | 2017-10-19 14:42:40 +0900 | [diff] [blame] | 236 | import com.android.server.connectivity.DefaultNetworkMetrics; |
| 237 | import com.android.server.connectivity.IpConnectivityMetrics; |
Lorenzo Colitti | 42cdf57 | 2017-03-21 18:54:11 +0900 | [diff] [blame] | 238 | import com.android.server.connectivity.MockableSystemProperties; |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 239 | import com.android.server.connectivity.Nat464Xlat; |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 240 | import com.android.server.connectivity.NetworkAgentInfo; |
Remi NGUYEN VAN | 0839a19 | 2019-06-17 11:28:27 +0900 | [diff] [blame] | 241 | import com.android.server.connectivity.NetworkNotificationManager.NotificationType; |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 242 | import com.android.server.connectivity.ProxyTracker; |
Chalard Jean | dda156a | 2018-01-10 21:19:32 +0900 | [diff] [blame] | 243 | import com.android.server.connectivity.Vpn; |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 244 | import com.android.server.net.NetworkPinner; |
Hugo Benichi | 938ab4f | 2017-02-11 17:04:43 +0900 | [diff] [blame] | 245 | import com.android.server.net.NetworkPolicyManagerInternal; |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 246 | import com.android.testutils.ExceptionUtils; |
Chalard Jean | ce75e0e | 2019-05-28 16:48:32 +0900 | [diff] [blame] | 247 | import com.android.testutils.HandlerUtilsKt; |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 248 | import com.android.testutils.RecorderCallback.CallbackEntry; |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 249 | import com.android.testutils.TestableNetworkCallback; |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 250 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 251 | import org.junit.After; |
| 252 | import org.junit.Before; |
Hugo Benichi | 849b81b | 2017-05-25 13:42:31 +0900 | [diff] [blame] | 253 | import org.junit.Ignore; |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 254 | import org.junit.Test; |
| 255 | import org.junit.runner.RunWith; |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 256 | import org.mockito.ArgumentCaptor; |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 257 | import org.mockito.InOrder; |
Lorenzo Colitti | 42cdf57 | 2017-03-21 18:54:11 +0900 | [diff] [blame] | 258 | import org.mockito.Mock; |
| 259 | import org.mockito.MockitoAnnotations; |
| 260 | import org.mockito.Spy; |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 261 | import org.mockito.stubbing.Answer; |
Lorenzo Colitti | 42cdf57 | 2017-03-21 18:54:11 +0900 | [diff] [blame] | 262 | |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 263 | import java.io.IOException; |
| 264 | import java.net.DatagramSocket; |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 265 | import java.net.Inet4Address; |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 266 | import java.net.Inet6Address; |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 267 | import java.net.InetAddress; |
Xiao Ma | a463711 | 2019-02-07 15:03:57 +0900 | [diff] [blame] | 268 | import java.net.InetSocketAddress; |
| 269 | import java.net.Socket; |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 270 | import java.util.ArrayList; |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 271 | import java.util.Arrays; |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 272 | import java.util.Collection; |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 273 | import java.util.Collections; |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 274 | import java.util.HashMap; |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 275 | import java.util.HashSet; |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 276 | import java.util.List; |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 277 | import java.util.Objects; |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 278 | import java.util.Set; |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 279 | import java.util.concurrent.CompletableFuture; |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 280 | import java.util.concurrent.CountDownLatch; |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 281 | import java.util.concurrent.Executor; |
junyulai | 0683511 | 2019-01-03 18:50:15 +0800 | [diff] [blame] | 282 | import java.util.concurrent.ExecutorService; |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 283 | import java.util.concurrent.Executors; |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 284 | import java.util.concurrent.LinkedBlockingQueue; |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 285 | import java.util.concurrent.TimeUnit; |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 286 | import java.util.concurrent.TimeoutException; |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 287 | import java.util.concurrent.atomic.AtomicBoolean; |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 288 | import java.util.concurrent.atomic.AtomicReference; |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 289 | import java.util.function.Predicate; |
Benedict Wong | 5d50ce8 | 2020-01-20 22:14:59 -0800 | [diff] [blame] | 290 | import java.util.function.Supplier; |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 291 | |
| 292 | import kotlin.reflect.KClass; |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 293 | |
| 294 | /** |
| 295 | * Tests for {@link ConnectivityService}. |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 296 | * |
| 297 | * Build, install and run with: |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 298 | * runtest frameworks-net -c com.android.server.ConnectivityServiceTest |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 299 | */ |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 300 | @RunWith(AndroidJUnit4.class) |
| 301 | @SmallTest |
| 302 | public class ConnectivityServiceTest { |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 303 | private static final String TAG = "ConnectivityServiceTest"; |
| 304 | |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 305 | private static final int TIMEOUT_MS = 500; |
Chalard Jean | b299b84 | 2019-09-27 17:13:14 +0900 | [diff] [blame] | 306 | private static final int TEST_LINGER_DELAY_MS = 300; |
Remi NGUYEN VAN | ef8377d | 2018-07-26 16:39:45 +0900 | [diff] [blame] | 307 | // Chosen to be less than the linger timeout. This ensures that we can distinguish between a |
| 308 | // LOST callback that arrives immediately and a LOST callback that arrives after the linger |
| 309 | // timeout. For this, our assertions should run fast enough to leave less than |
| 310 | // (mService.mLingerDelayMs - TEST_CALLBACK_TIMEOUT_MS) between the time callbacks are |
| 311 | // supposedly fired, and the time we call expectCallback. |
Chalard Jean | b299b84 | 2019-09-27 17:13:14 +0900 | [diff] [blame] | 312 | private static final int TEST_CALLBACK_TIMEOUT_MS = 250; |
Remi NGUYEN VAN | 4cb8062 | 2018-07-27 15:37:13 +0900 | [diff] [blame] | 313 | // Chosen to be less than TEST_CALLBACK_TIMEOUT_MS. This ensures that requests have time to |
| 314 | // complete before callbacks are verified. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 315 | private static final int TEST_REQUEST_TIMEOUT_MS = 150; |
| 316 | |
| 317 | private static final int UNREASONABLY_LONG_ALARM_WAIT_MS = 1000; |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 318 | |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 319 | private static final long TIMESTAMP = 1234L; |
| 320 | |
Cody Kesting | 3096b66 | 2020-03-18 21:11:29 +0000 | [diff] [blame] | 321 | private static final int NET_ID = 110; |
| 322 | |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 323 | private static final String CLAT_PREFIX = "v4-"; |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 324 | private static final String MOBILE_IFNAME = "test_rmnet_data0"; |
| 325 | private static final String WIFI_IFNAME = "test_wlan0"; |
Valentin Iftime | c86ebba | 2019-09-24 13:32:13 +0200 | [diff] [blame] | 326 | private static final String WIFI_WOL_IFNAME = "test_wlan_wol"; |
Lorenzo Colitti | a2e6363 | 2020-11-16 16:05:44 +0900 | [diff] [blame] | 327 | private static final String VPN_IFNAME = "tun10042"; |
Roshan Pius | e38acab | 2020-01-16 12:17:17 -0800 | [diff] [blame] | 328 | private static final String TEST_PACKAGE_NAME = "com.android.test.package"; |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 329 | private static final String[] EMPTY_STRING_ARRAY = new String[0]; |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 330 | |
Cody Kesting | 560eb26 | 2020-02-12 14:50:58 -0800 | [diff] [blame] | 331 | private static final String INTERFACE_NAME = "interface"; |
| 332 | |
Lorenzo Colitti | 4734cdb | 2017-04-27 14:30:21 +0900 | [diff] [blame] | 333 | private MockContext mServiceContext; |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 334 | private HandlerThread mCsHandlerThread; |
| 335 | private ConnectivityService mService; |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 336 | private WrappedConnectivityManager mCm; |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 337 | private TestNetworkAgentWrapper mWiFiNetworkAgent; |
| 338 | private TestNetworkAgentWrapper mCellNetworkAgent; |
| 339 | private TestNetworkAgentWrapper mEthernetNetworkAgent; |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 340 | private MockVpn mMockVpn; |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 341 | private Context mContext; |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 342 | private INetworkPolicyListener mPolicyListener; |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 343 | private WrappedMultinetworkPolicyTracker mPolicyTracker; |
| 344 | private HandlerThread mAlarmManagerThread; |
Lorenzo Colitti | 590e296 | 2020-11-16 10:11:12 +0900 | [diff] [blame] | 345 | private TestNetIdManager mNetIdManager; |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 346 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 347 | @Mock IIpConnectivityMetrics mIpConnectivityMetrics; |
Hugo Benichi | 64901e5 | 2017-10-19 14:42:40 +0900 | [diff] [blame] | 348 | @Mock IpConnectivityMetrics.Logger mMetricsService; |
| 349 | @Mock DefaultNetworkMetrics mDefaultNetworkMetrics; |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 350 | @Mock INetworkManagementService mNetworkManagementService; |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 351 | @Mock INetworkStatsService mStatsService; |
Chalard Jean | 587758b | 2019-11-29 16:41:50 +0900 | [diff] [blame] | 352 | @Mock IBatteryStats mBatteryStatsService; |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 353 | @Mock INetworkPolicyManager mNpm; |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 354 | @Mock IDnsResolver mMockDnsResolver; |
Chenbo Feng | 7f14dbc | 2018-11-08 17:36:21 -0800 | [diff] [blame] | 355 | @Mock INetd mMockNetd; |
Remi NGUYEN VAN | 5db454c | 2019-02-14 18:04:20 +0900 | [diff] [blame] | 356 | @Mock NetworkStackClient mNetworkStack; |
Rubin Xu | 9e64dc0 | 2019-04-23 18:04:14 +0100 | [diff] [blame] | 357 | @Mock PackageManager mPackageManager; |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 358 | @Mock UserManager mUserManager; |
Remi NGUYEN VAN | 0839a19 | 2019-06-17 11:28:27 +0900 | [diff] [blame] | 359 | @Mock NotificationManager mNotificationManager; |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 360 | @Mock AlarmManager mAlarmManager; |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 361 | @Mock IConnectivityDiagnosticsCallback mConnectivityDiagnosticsCallback; |
| 362 | @Mock IBinder mIBinder; |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 363 | @Mock LocationManager mLocationManager; |
| 364 | @Mock AppOpsManager mAppOpsManager; |
Hall Liu | ed6d6e6 | 2020-03-26 19:09:30 -0700 | [diff] [blame] | 365 | @Mock TelephonyManager mTelephonyManager; |
Hugo Benichi | 64901e5 | 2017-10-19 14:42:40 +0900 | [diff] [blame] | 366 | |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 367 | private ArgumentCaptor<ResolverParamsParcel> mResolverParamsParcelCaptor = |
| 368 | ArgumentCaptor.forClass(ResolverParamsParcel.class); |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 369 | |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 370 | // This class exists to test bindProcessToNetwork and getBoundNetworkForProcess. These methods |
| 371 | // do not go through ConnectivityService but talk to netd directly, so they don't automatically |
| 372 | // reflect the state of our test ConnectivityService. |
| 373 | private class WrappedConnectivityManager extends ConnectivityManager { |
| 374 | private Network mFakeBoundNetwork; |
| 375 | |
| 376 | public synchronized boolean bindProcessToNetwork(Network network) { |
| 377 | mFakeBoundNetwork = network; |
| 378 | return true; |
| 379 | } |
| 380 | |
| 381 | public synchronized Network getBoundNetworkForProcess() { |
| 382 | return mFakeBoundNetwork; |
| 383 | } |
| 384 | |
| 385 | public WrappedConnectivityManager(Context context, ConnectivityService service) { |
| 386 | super(context, service); |
| 387 | } |
| 388 | } |
| 389 | |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 390 | private class MockContext extends BroadcastInterceptingContext { |
Lorenzo Colitti | 6d553f6 | 2016-06-05 02:20:29 +0900 | [diff] [blame] | 391 | private final MockContentResolver mContentResolver; |
| 392 | |
Lorenzo Colitti | 42cdf57 | 2017-03-21 18:54:11 +0900 | [diff] [blame] | 393 | @Spy private Resources mResources; |
Lorenzo Colitti | 4734cdb | 2017-04-27 14:30:21 +0900 | [diff] [blame] | 394 | private final LinkedBlockingQueue<Intent> mStartedActivities = new LinkedBlockingQueue<>(); |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 395 | // Map of permission name -> PermissionManager.Permission_{GRANTED|DENIED} constant |
| 396 | private final HashMap<String, Integer> mMockedPermissions = new HashMap<>(); |
Lorenzo Colitti | 42cdf57 | 2017-03-21 18:54:11 +0900 | [diff] [blame] | 397 | |
Remi NGUYEN VAN | 91a1cc1 | 2018-09-28 14:33:11 +0900 | [diff] [blame] | 398 | MockContext(Context base, ContentProvider settingsProvider) { |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 399 | super(base); |
Lorenzo Colitti | 42cdf57 | 2017-03-21 18:54:11 +0900 | [diff] [blame] | 400 | |
| 401 | mResources = spy(base.getResources()); |
| 402 | when(mResources.getStringArray(com.android.internal.R.array.networkAttributes)). |
| 403 | thenReturn(new String[] { |
| 404 | "wifi,1,1,1,-1,true", |
| 405 | "mobile,0,0,0,-1,true", |
| 406 | "mobile_mms,2,0,2,60000,true", |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 407 | "mobile_supl,3,0,2,60000,true", |
Lorenzo Colitti | 42cdf57 | 2017-03-21 18:54:11 +0900 | [diff] [blame] | 408 | }); |
| 409 | |
Valentin Iftime | c86ebba | 2019-09-24 13:32:13 +0200 | [diff] [blame] | 410 | when(mResources.getStringArray( |
| 411 | com.android.internal.R.array.config_wakeonlan_supported_interfaces)) |
| 412 | .thenReturn(new String[]{ |
| 413 | WIFI_WOL_IFNAME, |
| 414 | }); |
| 415 | |
Lorenzo Colitti | 6d553f6 | 2016-06-05 02:20:29 +0900 | [diff] [blame] | 416 | mContentResolver = new MockContentResolver(); |
Remi NGUYEN VAN | 91a1cc1 | 2018-09-28 14:33:11 +0900 | [diff] [blame] | 417 | mContentResolver.addProvider(Settings.AUTHORITY, settingsProvider); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 418 | } |
| 419 | |
| 420 | @Override |
Lorenzo Colitti | 4734cdb | 2017-04-27 14:30:21 +0900 | [diff] [blame] | 421 | public void startActivityAsUser(Intent intent, UserHandle handle) { |
| 422 | mStartedActivities.offer(intent); |
| 423 | } |
| 424 | |
Chalard Jean | f30d1e1 | 2019-06-27 08:24:51 +0000 | [diff] [blame] | 425 | public Intent expectStartActivityIntent(int timeoutMs) { |
| 426 | Intent intent = null; |
| 427 | try { |
| 428 | intent = mStartedActivities.poll(timeoutMs, TimeUnit.MILLISECONDS); |
| 429 | } catch (InterruptedException e) {} |
| 430 | assertNotNull("Did not receive sign-in intent after " + timeoutMs + "ms", intent); |
| 431 | return intent; |
| 432 | } |
| 433 | |
Lorenzo Colitti | 4734cdb | 2017-04-27 14:30:21 +0900 | [diff] [blame] | 434 | public void expectNoStartActivityIntent(int timeoutMs) { |
| 435 | try { |
| 436 | assertNull("Received unexpected Intent to start activity", |
| 437 | mStartedActivities.poll(timeoutMs, TimeUnit.MILLISECONDS)); |
| 438 | } catch (InterruptedException e) {} |
| 439 | } |
| 440 | |
| 441 | @Override |
Lorenzo Colitti | 6d553f6 | 2016-06-05 02:20:29 +0900 | [diff] [blame] | 442 | public Object getSystemService(String name) { |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 443 | if (Context.CONNECTIVITY_SERVICE.equals(name)) return mCm; |
Remi NGUYEN VAN | 0839a19 | 2019-06-17 11:28:27 +0900 | [diff] [blame] | 444 | if (Context.NOTIFICATION_SERVICE.equals(name)) return mNotificationManager; |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 445 | if (Context.USER_SERVICE.equals(name)) return mUserManager; |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 446 | if (Context.ALARM_SERVICE.equals(name)) return mAlarmManager; |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 447 | if (Context.LOCATION_SERVICE.equals(name)) return mLocationManager; |
| 448 | if (Context.APP_OPS_SERVICE.equals(name)) return mAppOpsManager; |
Hall Liu | ed6d6e6 | 2020-03-26 19:09:30 -0700 | [diff] [blame] | 449 | if (Context.TELEPHONY_SERVICE.equals(name)) return mTelephonyManager; |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 450 | return super.getSystemService(name); |
| 451 | } |
Lorenzo Colitti | 6d553f6 | 2016-06-05 02:20:29 +0900 | [diff] [blame] | 452 | |
| 453 | @Override |
| 454 | public ContentResolver getContentResolver() { |
| 455 | return mContentResolver; |
| 456 | } |
Lorenzo Colitti | 42cdf57 | 2017-03-21 18:54:11 +0900 | [diff] [blame] | 457 | |
| 458 | @Override |
| 459 | public Resources getResources() { |
| 460 | return mResources; |
| 461 | } |
Rubin Xu | 9e64dc0 | 2019-04-23 18:04:14 +0100 | [diff] [blame] | 462 | |
| 463 | @Override |
| 464 | public PackageManager getPackageManager() { |
| 465 | return mPackageManager; |
| 466 | } |
Remi NGUYEN VAN | 0839a19 | 2019-06-17 11:28:27 +0900 | [diff] [blame] | 467 | |
Benedict Wong | 5d50ce8 | 2020-01-20 22:14:59 -0800 | [diff] [blame] | 468 | private int checkMockedPermission(String permission, Supplier<Integer> ifAbsent) { |
| 469 | final Integer granted = mMockedPermissions.get(permission); |
| 470 | return granted != null ? granted : ifAbsent.get(); |
| 471 | } |
| 472 | |
Remi NGUYEN VAN | 0839a19 | 2019-06-17 11:28:27 +0900 | [diff] [blame] | 473 | @Override |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 474 | public int checkPermission(String permission, int pid, int uid) { |
Benedict Wong | 5d50ce8 | 2020-01-20 22:14:59 -0800 | [diff] [blame] | 475 | return checkMockedPermission( |
| 476 | permission, () -> super.checkPermission(permission, pid, uid)); |
| 477 | } |
| 478 | |
| 479 | @Override |
| 480 | public int checkCallingOrSelfPermission(String permission) { |
| 481 | return checkMockedPermission( |
| 482 | permission, () -> super.checkCallingOrSelfPermission(permission)); |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 483 | } |
| 484 | |
| 485 | @Override |
Remi NGUYEN VAN | 0839a19 | 2019-06-17 11:28:27 +0900 | [diff] [blame] | 486 | public void enforceCallingOrSelfPermission(String permission, String message) { |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 487 | final Integer granted = mMockedPermissions.get(permission); |
| 488 | if (granted == null) { |
| 489 | super.enforceCallingOrSelfPermission(permission, message); |
| 490 | return; |
| 491 | } |
| 492 | |
| 493 | if (!granted.equals(PERMISSION_GRANTED)) { |
| 494 | throw new SecurityException("[Test] permission denied: " + permission); |
| 495 | } |
| 496 | } |
| 497 | |
| 498 | /** |
| 499 | * Mock checks for the specified permission, and have them behave as per {@code granted}. |
| 500 | * |
| 501 | * <p>Passing null reverts to default behavior, which does a real permission check on the |
| 502 | * test package. |
| 503 | * @param granted One of {@link PackageManager#PERMISSION_GRANTED} or |
| 504 | * {@link PackageManager#PERMISSION_DENIED}. |
| 505 | */ |
| 506 | public void setPermission(String permission, Integer granted) { |
| 507 | mMockedPermissions.put(permission, granted); |
Remi NGUYEN VAN | 0839a19 | 2019-06-17 11:28:27 +0900 | [diff] [blame] | 508 | } |
| 509 | } |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 510 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 511 | private void waitForIdle() { |
| 512 | HandlerUtilsKt.waitForIdle(mCsHandlerThread, TIMEOUT_MS); |
| 513 | waitForIdle(mCellNetworkAgent, TIMEOUT_MS); |
| 514 | waitForIdle(mWiFiNetworkAgent, TIMEOUT_MS); |
| 515 | waitForIdle(mEthernetNetworkAgent, TIMEOUT_MS); |
| 516 | HandlerUtilsKt.waitForIdle(mCsHandlerThread, TIMEOUT_MS); |
| 517 | HandlerUtilsKt.waitForIdle(ConnectivityThread.get(), TIMEOUT_MS); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 518 | } |
| 519 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 520 | private void waitForIdle(TestNetworkAgentWrapper agent, long timeoutMs) { |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 521 | if (agent == null) { |
| 522 | return; |
| 523 | } |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 524 | agent.waitForIdle(timeoutMs); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 525 | } |
| 526 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 527 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 528 | public void testWaitForIdle() throws Exception { |
Lorenzo Colitti | e58961a | 2015-08-07 20:17:27 +0900 | [diff] [blame] | 529 | final int attempts = 50; // Causes the test to take about 200ms on bullhead-eng. |
| 530 | |
| 531 | // Tests that waitForIdle returns immediately if the service is already idle. |
| 532 | for (int i = 0; i < attempts; i++) { |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 533 | waitForIdle(); |
Lorenzo Colitti | e58961a | 2015-08-07 20:17:27 +0900 | [diff] [blame] | 534 | } |
| 535 | |
| 536 | // Bring up a network that we can use to send messages to ConnectivityService. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 537 | ExpectedBroadcast b = expectConnectivityAction(TYPE_WIFI, DetailedState.CONNECTED); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 538 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | e58961a | 2015-08-07 20:17:27 +0900 | [diff] [blame] | 539 | mWiFiNetworkAgent.connect(false); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 540 | b.expectBroadcast(); |
Lorenzo Colitti | e58961a | 2015-08-07 20:17:27 +0900 | [diff] [blame] | 541 | Network n = mWiFiNetworkAgent.getNetwork(); |
| 542 | assertNotNull(n); |
| 543 | |
| 544 | // Tests that calling waitForIdle waits for messages to be processed. |
| 545 | for (int i = 0; i < attempts; i++) { |
| 546 | mWiFiNetworkAgent.setSignalStrength(i); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 547 | waitForIdle(); |
Lorenzo Colitti | e58961a | 2015-08-07 20:17:27 +0900 | [diff] [blame] | 548 | assertEquals(i, mCm.getNetworkCapabilities(n).getSignalStrength()); |
| 549 | } |
Hugo Benichi | 5d540d1 | 2016-10-17 15:54:51 +0900 | [diff] [blame] | 550 | } |
| 551 | |
Hugo Benichi | ad4db4e | 2016-10-17 15:54:51 +0900 | [diff] [blame] | 552 | // This test has an inherent race condition in it, and cannot be enabled for continuous testing |
| 553 | // or presubmit tests. It is kept for manual runs and documentation purposes. |
Andreas Gampe | 35dbf35 | 2018-01-26 20:41:17 -0800 | [diff] [blame] | 554 | @Ignore |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 555 | public void verifyThatNotWaitingForIdleCausesRaceConditions() throws Exception { |
Hugo Benichi | 5d540d1 | 2016-10-17 15:54:51 +0900 | [diff] [blame] | 556 | // Bring up a network that we can use to send messages to ConnectivityService. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 557 | ExpectedBroadcast b = expectConnectivityAction(TYPE_WIFI, DetailedState.CONNECTED); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 558 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Hugo Benichi | 5d540d1 | 2016-10-17 15:54:51 +0900 | [diff] [blame] | 559 | mWiFiNetworkAgent.connect(false); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 560 | b.expectBroadcast(); |
Hugo Benichi | 5d540d1 | 2016-10-17 15:54:51 +0900 | [diff] [blame] | 561 | Network n = mWiFiNetworkAgent.getNetwork(); |
| 562 | assertNotNull(n); |
Lorenzo Colitti | e58961a | 2015-08-07 20:17:27 +0900 | [diff] [blame] | 563 | |
| 564 | // Ensure that not calling waitForIdle causes a race condition. |
Hugo Benichi | 5d540d1 | 2016-10-17 15:54:51 +0900 | [diff] [blame] | 565 | final int attempts = 50; // Causes the test to take about 200ms on bullhead-eng. |
Lorenzo Colitti | e58961a | 2015-08-07 20:17:27 +0900 | [diff] [blame] | 566 | for (int i = 0; i < attempts; i++) { |
| 567 | mWiFiNetworkAgent.setSignalStrength(i); |
| 568 | if (i != mCm.getNetworkCapabilities(n).getSignalStrength()) { |
| 569 | // We hit a race condition, as expected. Pass the test. |
| 570 | return; |
| 571 | } |
| 572 | } |
| 573 | |
| 574 | // No race? There is a bug in this test. |
| 575 | fail("expected race condition at least once in " + attempts + " attempts"); |
| 576 | } |
| 577 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 578 | private class TestNetworkAgentWrapper extends NetworkAgentWrapper { |
Chiachang Wang | 8ea15c96 | 2019-05-23 16:29:30 +0800 | [diff] [blame] | 579 | private static final int VALIDATION_RESULT_INVALID = 0; |
| 580 | |
Cody Kesting | 4f49f14 | 2020-01-06 16:55:35 -0800 | [diff] [blame] | 581 | private static final long DATA_STALL_TIMESTAMP = 10L; |
| 582 | private static final int DATA_STALL_DETECTION_METHOD = 1; |
| 583 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 584 | private INetworkMonitor mNetworkMonitor; |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 585 | private INetworkMonitorCallbacks mNmCallbacks; |
Remi NGUYEN VAN | 24d8a33 | 2020-04-24 12:19:37 +0000 | [diff] [blame] | 586 | private int mNmValidationResult = VALIDATION_RESULT_INVALID; |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 587 | private int mProbesCompleted; |
| 588 | private int mProbesSucceeded; |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 589 | private String mNmValidationRedirectUrl = null; |
| 590 | private boolean mNmProvNotificationRequested = false; |
| 591 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 592 | private final ConditionVariable mNetworkStatusReceived = new ConditionVariable(); |
| 593 | // Contains the redirectUrl from networkStatus(). Before reading, wait for |
| 594 | // mNetworkStatusReceived. |
| 595 | private String mRedirectUrl; |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 596 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 597 | TestNetworkAgentWrapper(int transport) throws Exception { |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 598 | this(transport, new LinkProperties(), null); |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 599 | } |
| 600 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 601 | TestNetworkAgentWrapper(int transport, LinkProperties linkProperties) |
| 602 | throws Exception { |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 603 | this(transport, linkProperties, null); |
| 604 | } |
| 605 | |
| 606 | private TestNetworkAgentWrapper(int transport, LinkProperties linkProperties, |
| 607 | NetworkCapabilities ncTemplate) throws Exception { |
| 608 | super(transport, linkProperties, ncTemplate, mServiceContext); |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 609 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 610 | // Waits for the NetworkAgent to be registered, which includes the creation of the |
| 611 | // NetworkMonitor. |
| 612 | waitForIdle(TIMEOUT_MS); |
Chalard Jean | 3da8e0f | 2019-09-20 17:19:31 +0900 | [diff] [blame] | 613 | HandlerUtilsKt.waitForIdle(mCsHandlerThread, TIMEOUT_MS); |
| 614 | HandlerUtilsKt.waitForIdle(ConnectivityThread.get(), TIMEOUT_MS); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 615 | } |
| 616 | |
| 617 | @Override |
| 618 | protected InstrumentedNetworkAgent makeNetworkAgent(LinkProperties linkProperties) |
| 619 | throws Exception { |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 620 | mNetworkMonitor = mock(INetworkMonitor.class); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 621 | |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 622 | final Answer validateAnswer = inv -> { |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 623 | new Thread(ignoreExceptions(this::onValidationRequested)).start(); |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 624 | return null; |
| 625 | }; |
| 626 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 627 | doAnswer(validateAnswer).when(mNetworkMonitor).notifyNetworkConnected(any(), any()); |
| 628 | doAnswer(validateAnswer).when(mNetworkMonitor).forceReevaluation(anyInt()); |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 629 | |
Remi NGUYEN VAN | 904a38b | 2019-03-15 02:25:09 +0900 | [diff] [blame] | 630 | final ArgumentCaptor<Network> nmNetworkCaptor = ArgumentCaptor.forClass(Network.class); |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 631 | final ArgumentCaptor<INetworkMonitorCallbacks> nmCbCaptor = |
| 632 | ArgumentCaptor.forClass(INetworkMonitorCallbacks.class); |
| 633 | doNothing().when(mNetworkStack).makeNetworkMonitor( |
| 634 | nmNetworkCaptor.capture(), |
| 635 | any() /* name */, |
| 636 | nmCbCaptor.capture()); |
| 637 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 638 | final InstrumentedNetworkAgent na = new InstrumentedNetworkAgent(this, linkProperties) { |
Paul Jensen | 23243731 | 2016-04-06 09:51:26 -0400 | [diff] [blame] | 639 | @Override |
| 640 | public void networkStatus(int status, String redirectUrl) { |
| 641 | mRedirectUrl = redirectUrl; |
| 642 | mNetworkStatusReceived.open(); |
| 643 | } |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 644 | }; |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 645 | |
Chalard Jean | 29c6e0c | 2020-01-16 17:13:26 +0900 | [diff] [blame] | 646 | assertEquals(na.getNetwork().netId, nmNetworkCaptor.getValue().netId); |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 647 | mNmCallbacks = nmCbCaptor.getValue(); |
| 648 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 649 | mNmCallbacks.onNetworkMonitorCreated(mNetworkMonitor); |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 650 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 651 | return na; |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 652 | } |
| 653 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 654 | private void onValidationRequested() throws Exception { |
| 655 | if (mNmProvNotificationRequested |
| 656 | && ((mNmValidationResult & NETWORK_VALIDATION_RESULT_VALID) != 0)) { |
| 657 | mNmCallbacks.hideProvisioningNotification(); |
| 658 | mNmProvNotificationRequested = false; |
| 659 | } |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 660 | |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 661 | mNmCallbacks.notifyProbeStatusChanged(mProbesCompleted, mProbesSucceeded); |
Remi NGUYEN VAN | 24d8a33 | 2020-04-24 12:19:37 +0000 | [diff] [blame] | 662 | final NetworkTestResultParcelable p = new NetworkTestResultParcelable(); |
| 663 | p.result = mNmValidationResult; |
| 664 | p.probesAttempted = mProbesCompleted; |
| 665 | p.probesSucceeded = mProbesSucceeded; |
| 666 | p.redirectUrl = mNmValidationRedirectUrl; |
| 667 | p.timestampMillis = TIMESTAMP; |
| 668 | mNmCallbacks.notifyNetworkTestedWithExtras(p); |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 669 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 670 | if (mNmValidationRedirectUrl != null) { |
| 671 | mNmCallbacks.showProvisioningNotification( |
Roshan Pius | e38acab | 2020-01-16 12:17:17 -0800 | [diff] [blame] | 672 | "test_provisioning_notif_action", TEST_PACKAGE_NAME); |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 673 | mNmProvNotificationRequested = true; |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 674 | } |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 675 | } |
| 676 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 677 | /** |
| 678 | * Connect without adding any internet capability. |
| 679 | */ |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 680 | public void connectWithoutInternet() { |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 681 | super.connect(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 682 | } |
| 683 | |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 684 | /** |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 685 | * Transition this NetworkAgent to CONNECTED state with NET_CAPABILITY_INTERNET. |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 686 | * @param validated Indicate if network should pretend to be validated. |
| 687 | */ |
| 688 | public void connect(boolean validated) { |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 689 | connect(validated, true, false /* isStrictMode */); |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 690 | } |
| 691 | |
| 692 | /** |
| 693 | * Transition this NetworkAgent to CONNECTED state. |
| 694 | * @param validated Indicate if network should pretend to be validated. |
| 695 | * @param hasInternet Indicate if network should pretend to have NET_CAPABILITY_INTERNET. |
| 696 | */ |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 697 | public void connect(boolean validated, boolean hasInternet, boolean isStrictMode) { |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 698 | assertFalse(getNetworkCapabilities().hasCapability(NET_CAPABILITY_INTERNET)); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 699 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 700 | ConnectivityManager.NetworkCallback callback = null; |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 701 | final ConditionVariable validatedCv = new ConditionVariable(); |
| 702 | if (validated) { |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 703 | setNetworkValid(isStrictMode); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 704 | NetworkRequest request = new NetworkRequest.Builder() |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 705 | .addTransportType(getNetworkCapabilities().getTransportTypes()[0]) |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 706 | .clearCapabilities() |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 707 | .build(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 708 | callback = new ConnectivityManager.NetworkCallback() { |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 709 | public void onCapabilitiesChanged(Network network, |
| 710 | NetworkCapabilities networkCapabilities) { |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 711 | if (network.equals(getNetwork()) && |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 712 | networkCapabilities.hasCapability(NET_CAPABILITY_VALIDATED)) { |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 713 | validatedCv.open(); |
| 714 | } |
| 715 | } |
| 716 | }; |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 717 | mCm.registerNetworkCallback(request, callback); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 718 | } |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 719 | if (hasInternet) { |
| 720 | addCapability(NET_CAPABILITY_INTERNET); |
| 721 | } |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 722 | |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 723 | connectWithoutInternet(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 724 | |
| 725 | if (validated) { |
| 726 | // Wait for network to validate. |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 727 | waitFor(validatedCv); |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 728 | setNetworkInvalid(isStrictMode); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 729 | } |
| 730 | |
| 731 | if (callback != null) mCm.unregisterNetworkCallback(callback); |
| 732 | } |
| 733 | |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 734 | public void connectWithCaptivePortal(String redirectUrl, boolean isStrictMode) { |
| 735 | setNetworkPortal(redirectUrl, isStrictMode); |
| 736 | connect(false, true /* hasInternet */, isStrictMode); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 737 | } |
| 738 | |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 739 | public void connectWithPartialConnectivity() { |
| 740 | setNetworkPartial(); |
| 741 | connect(false); |
| 742 | } |
| 743 | |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 744 | public void connectWithPartialValidConnectivity(boolean isStrictMode) { |
| 745 | setNetworkPartialValid(isStrictMode); |
| 746 | connect(false, true /* hasInternet */, isStrictMode); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 747 | } |
| 748 | |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 749 | void setNetworkValid(boolean isStrictMode) { |
Remi NGUYEN VAN | 24d8a33 | 2020-04-24 12:19:37 +0000 | [diff] [blame] | 750 | mNmValidationResult = NETWORK_VALIDATION_RESULT_VALID; |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 751 | mNmValidationRedirectUrl = null; |
Remi NGUYEN VAN | 24d8a33 | 2020-04-24 12:19:37 +0000 | [diff] [blame] | 752 | int probesSucceeded = NETWORK_VALIDATION_PROBE_DNS | NETWORK_VALIDATION_PROBE_HTTPS; |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 753 | if (isStrictMode) { |
| 754 | probesSucceeded |= NETWORK_VALIDATION_PROBE_PRIVDNS; |
| 755 | } |
| 756 | // The probesCompleted equals to probesSucceeded for the case of valid network, so put |
| 757 | // the same value into two different parameter of the method. |
| 758 | setProbesStatus(probesSucceeded, probesSucceeded); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 759 | } |
| 760 | |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 761 | void setNetworkInvalid(boolean isStrictMode) { |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 762 | mNmValidationResult = VALIDATION_RESULT_INVALID; |
| 763 | mNmValidationRedirectUrl = null; |
Remi NGUYEN VAN | 24d8a33 | 2020-04-24 12:19:37 +0000 | [diff] [blame] | 764 | int probesCompleted = NETWORK_VALIDATION_PROBE_DNS | NETWORK_VALIDATION_PROBE_HTTPS |
| 765 | | NETWORK_VALIDATION_PROBE_HTTP; |
| 766 | int probesSucceeded = 0; |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 767 | // If the isStrictMode is true, it means the network is invalid when NetworkMonitor |
| 768 | // tried to validate the private DNS but failed. |
| 769 | if (isStrictMode) { |
| 770 | probesCompleted &= ~NETWORK_VALIDATION_PROBE_HTTP; |
| 771 | probesSucceeded = probesCompleted; |
| 772 | probesCompleted |= NETWORK_VALIDATION_PROBE_PRIVDNS; |
| 773 | } |
| 774 | setProbesStatus(probesCompleted, probesSucceeded); |
Chalard Jean | 804b8fb | 2018-01-30 22:41:41 +0900 | [diff] [blame] | 775 | } |
| 776 | |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 777 | void setNetworkPortal(String redirectUrl, boolean isStrictMode) { |
| 778 | setNetworkInvalid(isStrictMode); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 779 | mNmValidationRedirectUrl = redirectUrl; |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 780 | // Suppose the portal is found when NetworkMonitor probes NETWORK_VALIDATION_PROBE_HTTP |
| 781 | // in the beginning, so the NETWORK_VALIDATION_PROBE_HTTPS hasn't probed yet. |
Remi NGUYEN VAN | 24d8a33 | 2020-04-24 12:19:37 +0000 | [diff] [blame] | 782 | int probesCompleted = NETWORK_VALIDATION_PROBE_DNS | NETWORK_VALIDATION_PROBE_HTTP; |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 783 | int probesSucceeded = VALIDATION_RESULT_INVALID; |
| 784 | if (isStrictMode) { |
| 785 | probesCompleted |= NETWORK_VALIDATION_PROBE_PRIVDNS; |
| 786 | } |
| 787 | setProbesStatus(probesCompleted, probesSucceeded); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 788 | } |
| 789 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 790 | void setNetworkPartial() { |
Remi NGUYEN VAN | 24d8a33 | 2020-04-24 12:19:37 +0000 | [diff] [blame] | 791 | mNmValidationResult = NETWORK_VALIDATION_RESULT_PARTIAL; |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 792 | mNmValidationRedirectUrl = null; |
Remi NGUYEN VAN | 24d8a33 | 2020-04-24 12:19:37 +0000 | [diff] [blame] | 793 | int probesCompleted = NETWORK_VALIDATION_PROBE_DNS | NETWORK_VALIDATION_PROBE_HTTPS |
| 794 | | NETWORK_VALIDATION_PROBE_FALLBACK; |
| 795 | int probesSucceeded = NETWORK_VALIDATION_PROBE_DNS | NETWORK_VALIDATION_PROBE_FALLBACK; |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 796 | setProbesStatus(probesCompleted, probesSucceeded); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 797 | } |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 798 | |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 799 | void setNetworkPartialValid(boolean isStrictMode) { |
| 800 | setNetworkPartial(); |
Remi NGUYEN VAN | 24d8a33 | 2020-04-24 12:19:37 +0000 | [diff] [blame] | 801 | mNmValidationResult |= NETWORK_VALIDATION_RESULT_VALID; |
| 802 | int probesCompleted = NETWORK_VALIDATION_PROBE_DNS | NETWORK_VALIDATION_PROBE_HTTPS |
| 803 | | NETWORK_VALIDATION_PROBE_HTTP; |
| 804 | int probesSucceeded = NETWORK_VALIDATION_PROBE_DNS | NETWORK_VALIDATION_PROBE_HTTP; |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 805 | // Suppose the partial network cannot pass the private DNS validation as well, so only |
| 806 | // add NETWORK_VALIDATION_PROBE_DNS in probesCompleted but not probesSucceeded. |
| 807 | if (isStrictMode) { |
| 808 | probesCompleted |= NETWORK_VALIDATION_PROBE_PRIVDNS; |
| 809 | } |
| 810 | setProbesStatus(probesCompleted, probesSucceeded); |
| 811 | } |
| 812 | |
| 813 | void setProbesStatus(int probesCompleted, int probesSucceeded) { |
| 814 | mProbesCompleted = probesCompleted; |
| 815 | mProbesSucceeded = probesSucceeded; |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 816 | } |
Paul Jensen | 23243731 | 2016-04-06 09:51:26 -0400 | [diff] [blame] | 817 | |
Remi NGUYEN VAN | 91aa5bc | 2019-12-12 12:57:11 +0900 | [diff] [blame] | 818 | void notifyCaptivePortalDataChanged(CaptivePortalData data) { |
| 819 | try { |
| 820 | mNmCallbacks.notifyCaptivePortalDataChanged(data); |
| 821 | } catch (RemoteException e) { |
| 822 | throw new AssertionError("This cannot happen", e); |
| 823 | } |
| 824 | } |
| 825 | |
Paul Jensen | 23243731 | 2016-04-06 09:51:26 -0400 | [diff] [blame] | 826 | public String waitForRedirectUrl() { |
| 827 | assertTrue(mNetworkStatusReceived.block(TIMEOUT_MS)); |
| 828 | return mRedirectUrl; |
| 829 | } |
Chalard Jean | 804b8fb | 2018-01-30 22:41:41 +0900 | [diff] [blame] | 830 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 831 | public void expectDisconnected() { |
| 832 | expectDisconnected(TIMEOUT_MS); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 833 | } |
| 834 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 835 | public void expectPreventReconnectReceived() { |
| 836 | expectPreventReconnectReceived(TIMEOUT_MS); |
Chalard Jean | 804b8fb | 2018-01-30 22:41:41 +0900 | [diff] [blame] | 837 | } |
Cody Kesting | 4f49f14 | 2020-01-06 16:55:35 -0800 | [diff] [blame] | 838 | |
| 839 | void notifyDataStallSuspected() throws Exception { |
Remi NGUYEN VAN | 24d8a33 | 2020-04-24 12:19:37 +0000 | [diff] [blame] | 840 | final DataStallReportParcelable p = new DataStallReportParcelable(); |
| 841 | p.detectionMethod = DATA_STALL_DETECTION_METHOD; |
| 842 | p.timestampMillis = DATA_STALL_TIMESTAMP; |
| 843 | mNmCallbacks.notifyDataStallSuspected(p); |
Cody Kesting | 4f49f14 | 2020-01-06 16:55:35 -0800 | [diff] [blame] | 844 | } |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 845 | } |
| 846 | |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 847 | /** |
| 848 | * A NetworkFactory that allows tests to wait until any in-flight NetworkRequest add or remove |
| 849 | * operations have been processed. Before ConnectivityService can add or remove any requests, |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 850 | * the factory must be told to expect those operations by calling expectAddRequestsWithScores or |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 851 | * expectRemoveRequests. |
| 852 | */ |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 853 | private static class MockNetworkFactory extends NetworkFactory { |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 854 | private final ConditionVariable mNetworkStartedCV = new ConditionVariable(); |
| 855 | private final ConditionVariable mNetworkStoppedCV = new ConditionVariable(); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 856 | private final AtomicBoolean mNetworkStarted = new AtomicBoolean(false); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 857 | |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 858 | // Used to expect that requests be removed or added on a separate thread, without sleeping. |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 859 | // Callers can call either expectAddRequestsWithScores() or expectRemoveRequests() exactly |
| 860 | // once, then cause some other thread to add or remove requests, then call |
| 861 | // waitForRequests(). |
| 862 | // It is not possible to wait for both add and remove requests. When adding, the queue |
| 863 | // contains the expected score. When removing, the value is unused, all matters is the |
| 864 | // number of objects in the queue. |
| 865 | private final LinkedBlockingQueue<Integer> mExpectations; |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 866 | |
| 867 | // Whether we are currently expecting requests to be added or removed. Valid only if |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 868 | // mExpectations is non-empty. |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 869 | private boolean mExpectingAdditions; |
| 870 | |
Etan Cohen | ddb720a | 2019-01-08 12:09:18 -0800 | [diff] [blame] | 871 | // Used to collect the networks requests managed by this factory. This is a duplicate of |
| 872 | // the internal information stored in the NetworkFactory (which is private). |
| 873 | private SparseArray<NetworkRequest> mNetworkRequests = new SparseArray<>(); |
| 874 | |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 875 | public MockNetworkFactory(Looper looper, Context context, String logTag, |
| 876 | NetworkCapabilities filter) { |
| 877 | super(looper, context, logTag, filter); |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 878 | mExpectations = new LinkedBlockingQueue<>(); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 879 | } |
| 880 | |
| 881 | public int getMyRequestCount() { |
| 882 | return getRequestCount(); |
| 883 | } |
| 884 | |
| 885 | protected void startNetwork() { |
| 886 | mNetworkStarted.set(true); |
Paul Jensen | 0a2823e | 2015-06-12 10:31:09 -0400 | [diff] [blame] | 887 | mNetworkStartedCV.open(); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 888 | } |
| 889 | |
| 890 | protected void stopNetwork() { |
| 891 | mNetworkStarted.set(false); |
Paul Jensen | 0a2823e | 2015-06-12 10:31:09 -0400 | [diff] [blame] | 892 | mNetworkStoppedCV.open(); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 893 | } |
| 894 | |
| 895 | public boolean getMyStartRequested() { |
| 896 | return mNetworkStarted.get(); |
| 897 | } |
Paul Jensen | 0a2823e | 2015-06-12 10:31:09 -0400 | [diff] [blame] | 898 | |
| 899 | public ConditionVariable getNetworkStartedCV() { |
| 900 | mNetworkStartedCV.close(); |
| 901 | return mNetworkStartedCV; |
| 902 | } |
| 903 | |
| 904 | public ConditionVariable getNetworkStoppedCV() { |
| 905 | mNetworkStoppedCV.close(); |
| 906 | return mNetworkStoppedCV; |
| 907 | } |
| 908 | |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 909 | @Override |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 910 | protected void handleAddRequest(NetworkRequest request, int score, |
| 911 | int factorySerialNumber) { |
| 912 | synchronized (mExpectations) { |
| 913 | final Integer expectedScore = mExpectations.poll(); // null if the queue is empty |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 914 | |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 915 | assertNotNull("Added more requests than expected (" + request + " score : " |
| 916 | + score + ")", expectedScore); |
| 917 | // If we're expecting anything, we must be expecting additions. |
| 918 | if (!mExpectingAdditions) { |
| 919 | fail("Can't add requests while expecting requests to be removed"); |
| 920 | } |
| 921 | if (expectedScore != score) { |
| 922 | fail("Expected score was " + expectedScore + " but actual was " + score |
| 923 | + " in added request"); |
| 924 | } |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 925 | |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 926 | // Add the request. |
| 927 | mNetworkRequests.put(request.requestId, request); |
| 928 | super.handleAddRequest(request, score, factorySerialNumber); |
| 929 | mExpectations.notify(); |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 930 | } |
Paul Jensen | 0a2823e | 2015-06-12 10:31:09 -0400 | [diff] [blame] | 931 | } |
| 932 | |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 933 | @Override |
| 934 | protected void handleRemoveRequest(NetworkRequest request) { |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 935 | synchronized (mExpectations) { |
| 936 | final Integer expectedScore = mExpectations.poll(); // null if the queue is empty |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 937 | |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 938 | assertTrue("Removed more requests than expected", expectedScore != null); |
| 939 | // If we're expecting anything, we must be expecting removals. |
| 940 | if (mExpectingAdditions) { |
| 941 | fail("Can't remove requests while expecting requests to be added"); |
| 942 | } |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 943 | |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 944 | // Remove the request. |
| 945 | mNetworkRequests.remove(request.requestId); |
| 946 | super.handleRemoveRequest(request); |
| 947 | mExpectations.notify(); |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 948 | } |
Paul Jensen | 0a2823e | 2015-06-12 10:31:09 -0400 | [diff] [blame] | 949 | } |
| 950 | |
Etan Cohen | ddb720a | 2019-01-08 12:09:18 -0800 | [diff] [blame] | 951 | // Trigger releasing the request as unfulfillable |
| 952 | public void triggerUnfulfillable(NetworkRequest r) { |
| 953 | super.releaseRequestAsUnfulfillableByAnyFactory(r); |
| 954 | } |
| 955 | |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 956 | private void assertNoExpectations() { |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 957 | if (mExpectations.size() != 0) { |
| 958 | fail("Can't add expectation, " + mExpectations.size() + " already pending"); |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 959 | } |
Paul Jensen | 0a2823e | 2015-06-12 10:31:09 -0400 | [diff] [blame] | 960 | } |
| 961 | |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 962 | // Expects that requests with the specified scores will be added. |
| 963 | public void expectAddRequestsWithScores(final int... scores) { |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 964 | assertNoExpectations(); |
| 965 | mExpectingAdditions = true; |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 966 | for (int score : scores) { |
| 967 | mExpectations.add(score); |
| 968 | } |
Paul Jensen | 0a2823e | 2015-06-12 10:31:09 -0400 | [diff] [blame] | 969 | } |
| 970 | |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 971 | // Expects that count requests will be removed. |
| 972 | public void expectRemoveRequests(final int count) { |
| 973 | assertNoExpectations(); |
| 974 | mExpectingAdditions = false; |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 975 | for (int i = 0; i < count; ++i) { |
| 976 | mExpectations.add(0); // For removals the score is ignored so any value will do. |
| 977 | } |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 978 | } |
| 979 | |
| 980 | // Waits for the expected request additions or removals to happen within a timeout. |
| 981 | public void waitForRequests() throws InterruptedException { |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 982 | final long deadline = SystemClock.elapsedRealtime() + TIMEOUT_MS; |
| 983 | synchronized (mExpectations) { |
| 984 | while (mExpectations.size() > 0 && SystemClock.elapsedRealtime() < deadline) { |
| 985 | mExpectations.wait(deadline - SystemClock.elapsedRealtime()); |
| 986 | } |
| 987 | } |
| 988 | final long count = mExpectations.size(); |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 989 | final String msg = count + " requests still not " + |
| 990 | (mExpectingAdditions ? "added" : "removed") + |
| 991 | " after " + TIMEOUT_MS + " ms"; |
| 992 | assertEquals(msg, 0, count); |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 993 | } |
| 994 | |
Etan Cohen | ddb720a | 2019-01-08 12:09:18 -0800 | [diff] [blame] | 995 | public SparseArray<NetworkRequest> waitForNetworkRequests(final int count) |
| 996 | throws InterruptedException { |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 997 | waitForRequests(); |
| 998 | assertEquals(count, getMyRequestCount()); |
Etan Cohen | ddb720a | 2019-01-08 12:09:18 -0800 | [diff] [blame] | 999 | return mNetworkRequests; |
Paul Jensen | 0a2823e | 2015-06-12 10:31:09 -0400 | [diff] [blame] | 1000 | } |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 1001 | } |
| 1002 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 1003 | private Set<UidRange> uidRangesForUid(int uid) { |
| 1004 | final ArraySet<UidRange> ranges = new ArraySet<>(); |
| 1005 | ranges.add(new UidRange(uid, uid)); |
| 1006 | return ranges; |
| 1007 | } |
| 1008 | |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 1009 | private static Looper startHandlerThreadAndReturnLooper() { |
| 1010 | final HandlerThread handlerThread = new HandlerThread("MockVpnThread"); |
| 1011 | handlerThread.start(); |
| 1012 | return handlerThread.getLooper(); |
| 1013 | } |
| 1014 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 1015 | private class MockVpn extends Vpn implements TestableNetworkCallback.HasNetwork { |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 1016 | // Careful ! This is different from mNetworkAgent, because MockNetworkAgent does |
| 1017 | // not inherit from NetworkAgent. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1018 | private TestNetworkAgentWrapper mMockNetworkAgent; |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 1019 | private boolean mAgentRegistered = false; |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 1020 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 1021 | private int mVpnType = VpnManager.TYPE_VPN_SERVICE; |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 1022 | private VpnInfo mVpnInfo; |
| 1023 | |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 1024 | public MockVpn(int userId) { |
| 1025 | super(startHandlerThreadAndReturnLooper(), mServiceContext, mNetworkManagementService, |
Benedict Wong | b570e86 | 2020-01-17 19:33:55 -0800 | [diff] [blame] | 1026 | userId, mock(KeyStore.class)); |
Lorenzo Colitti | a2e6363 | 2020-11-16 16:05:44 +0900 | [diff] [blame] | 1027 | mConfig = new VpnConfig(); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 1028 | } |
| 1029 | |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 1030 | public void setUids(Set<UidRange> uids) { |
| 1031 | mNetworkCapabilities.setUids(uids); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 1032 | updateCapabilitiesInternal(null /* defaultNetwork */, true); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 1033 | } |
| 1034 | |
Benedict Wong | 5d50ce8 | 2020-01-20 22:14:59 -0800 | [diff] [blame] | 1035 | public void setVpnType(int vpnType) { |
| 1036 | mVpnType = vpnType; |
| 1037 | } |
| 1038 | |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 1039 | @Override |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 1040 | public Network getNetwork() { |
| 1041 | return (mMockNetworkAgent == null) ? null : mMockNetworkAgent.getNetwork(); |
| 1042 | } |
| 1043 | |
| 1044 | @Override |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 1045 | public int getNetId() { |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 1046 | return (mMockNetworkAgent == null) ? NETID_UNSET : mMockNetworkAgent.getNetwork().netId; |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 1047 | } |
| 1048 | |
| 1049 | @Override |
Benedict Wong | 5d50ce8 | 2020-01-20 22:14:59 -0800 | [diff] [blame] | 1050 | public int getActiveAppVpnType() { |
| 1051 | return mVpnType; |
| 1052 | } |
| 1053 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 1054 | private void registerAgent(boolean isAlwaysMetered, Set<UidRange> uids, LinkProperties lp) |
| 1055 | throws Exception { |
| 1056 | if (mAgentRegistered) throw new IllegalStateException("already registered"); |
| 1057 | setUids(uids); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 1058 | mConfig.isMetered = isAlwaysMetered; |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 1059 | mInterface = VPN_IFNAME; |
| 1060 | mMockNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_VPN, lp, |
| 1061 | mNetworkCapabilities); |
| 1062 | mMockNetworkAgent.waitForIdle(TIMEOUT_MS); |
| 1063 | mAgentRegistered = true; |
| 1064 | mNetworkCapabilities.set(mMockNetworkAgent.getNetworkCapabilities()); |
| 1065 | mNetworkAgent = mMockNetworkAgent.getNetworkAgent(); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 1066 | } |
| 1067 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 1068 | private void registerAgent(Set<UidRange> uids) throws Exception { |
| 1069 | registerAgent(false /* isAlwaysMetered */, uids, new LinkProperties()); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 1070 | } |
| 1071 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 1072 | private void connect(boolean validated, boolean hasInternet, boolean isStrictMode) { |
| 1073 | mMockNetworkAgent.connect(validated, hasInternet, isStrictMode); |
| 1074 | } |
| 1075 | |
| 1076 | private void connect(boolean validated) { |
| 1077 | mMockNetworkAgent.connect(validated); |
| 1078 | } |
| 1079 | |
| 1080 | private TestNetworkAgentWrapper getAgent() { |
| 1081 | return mMockNetworkAgent; |
| 1082 | } |
| 1083 | |
| 1084 | public void establish(LinkProperties lp, int uid, Set<UidRange> ranges, boolean validated, |
| 1085 | boolean hasInternet, boolean isStrictMode) throws Exception { |
| 1086 | mNetworkCapabilities.setOwnerUid(uid); |
| 1087 | mNetworkCapabilities.setAdministratorUids(new int[]{uid}); |
| 1088 | registerAgent(false, ranges, lp); |
| 1089 | connect(validated, hasInternet, isStrictMode); |
| 1090 | waitForIdle(); |
| 1091 | } |
| 1092 | |
| 1093 | public void establish(LinkProperties lp, int uid, Set<UidRange> ranges) throws Exception { |
| 1094 | establish(lp, uid, ranges, true, true, false); |
| 1095 | } |
| 1096 | |
| 1097 | public void establishForMyUid(LinkProperties lp) throws Exception { |
| 1098 | final int uid = Process.myUid(); |
| 1099 | establish(lp, uid, uidRangesForUid(uid), true, true, false); |
| 1100 | } |
| 1101 | |
| 1102 | public void establishForMyUid(boolean validated, boolean hasInternet, boolean isStrictMode) |
| 1103 | throws Exception { |
| 1104 | final int uid = Process.myUid(); |
| 1105 | establish(new LinkProperties(), uid, uidRangesForUid(uid), validated, hasInternet, |
| 1106 | isStrictMode); |
| 1107 | } |
| 1108 | |
| 1109 | public void establishForMyUid() throws Exception { |
| 1110 | establishForMyUid(new LinkProperties()); |
| 1111 | } |
| 1112 | |
| 1113 | public void sendLinkProperties(LinkProperties lp) { |
| 1114 | mMockNetworkAgent.sendLinkProperties(lp); |
| 1115 | } |
| 1116 | |
| 1117 | private NetworkCapabilities updateCapabilitiesInternal(Network defaultNetwork, |
| 1118 | boolean sendToConnectivityService) { |
| 1119 | if (!mAgentRegistered) return null; |
| 1120 | super.updateCapabilities(defaultNetwork); |
| 1121 | // Because super.updateCapabilities will update the capabilities of the agent but |
| 1122 | // not the mock agent, the mock agent needs to know about them. |
| 1123 | copyCapabilitiesToNetworkAgent(sendToConnectivityService); |
| 1124 | return new NetworkCapabilities(mNetworkCapabilities); |
| 1125 | } |
| 1126 | |
| 1127 | private void copyCapabilitiesToNetworkAgent(boolean sendToConnectivityService) { |
| 1128 | if (null != mMockNetworkAgent) { |
| 1129 | mMockNetworkAgent.setNetworkCapabilities(mNetworkCapabilities, |
| 1130 | sendToConnectivityService); |
| 1131 | } |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 1132 | } |
| 1133 | |
| 1134 | @Override |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 1135 | public NetworkCapabilities updateCapabilities(Network defaultNetwork) { |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 1136 | return updateCapabilitiesInternal(defaultNetwork, false); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 1137 | } |
| 1138 | |
| 1139 | public void disconnect() { |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 1140 | if (mMockNetworkAgent != null) mMockNetworkAgent.disconnect(); |
| 1141 | mAgentRegistered = false; |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 1142 | } |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 1143 | |
| 1144 | @Override |
| 1145 | public synchronized VpnInfo getVpnInfo() { |
| 1146 | if (mVpnInfo != null) return mVpnInfo; |
| 1147 | |
| 1148 | return super.getVpnInfo(); |
| 1149 | } |
| 1150 | |
Cody Kesting | 3096b66 | 2020-03-18 21:11:29 +0000 | [diff] [blame] | 1151 | private synchronized void setVpnInfo(VpnInfo vpnInfo) { |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 1152 | mVpnInfo = vpnInfo; |
| 1153 | } |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 1154 | } |
| 1155 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1156 | private void mockVpn(int uid) { |
| 1157 | synchronized (mService.mVpns) { |
| 1158 | int userId = UserHandle.getUserId(uid); |
| 1159 | mMockVpn = new MockVpn(userId); |
| 1160 | // This has no effect unless the VPN is actually connected, because things like |
| 1161 | // getActiveNetworkForUidInternal call getNetworkAgentInfoForNetId on the VPN |
| 1162 | // netId, and check if that network is actually connected. |
| 1163 | mService.mVpns.put(userId, mMockVpn); |
Lorenzo Colitti | bfecba2 | 2016-02-21 01:09:26 +0900 | [diff] [blame] | 1164 | } |
| 1165 | } |
| 1166 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1167 | private void setUidRulesChanged(int uidRules) throws RemoteException { |
| 1168 | mPolicyListener.onUidRulesChanged(Process.myUid(), uidRules); |
| 1169 | } |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 1170 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1171 | private void setRestrictBackgroundChanged(boolean restrictBackground) throws RemoteException { |
| 1172 | mPolicyListener.onRestrictBackgroundChanged(restrictBackground); |
| 1173 | } |
| 1174 | |
| 1175 | private Nat464Xlat getNat464Xlat(NetworkAgentWrapper mna) { |
| 1176 | return mService.getNetworkAgentInfoForNetwork(mna.getNetwork()).clatd; |
| 1177 | } |
| 1178 | |
| 1179 | private static class WrappedMultinetworkPolicyTracker extends MultinetworkPolicyTracker { |
| 1180 | volatile boolean mConfigRestrictsAvoidBadWifi; |
| 1181 | volatile int mConfigMeteredMultipathPreference; |
| 1182 | |
| 1183 | WrappedMultinetworkPolicyTracker(Context c, Handler h, Runnable r) { |
Erik Kline | 065ab6e | 2016-10-02 18:02:14 +0900 | [diff] [blame] | 1184 | super(c, h, r); |
| 1185 | } |
| 1186 | |
| 1187 | @Override |
| 1188 | public boolean configRestrictsAvoidBadWifi() { |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1189 | return mConfigRestrictsAvoidBadWifi; |
Erik Kline | 065ab6e | 2016-10-02 18:02:14 +0900 | [diff] [blame] | 1190 | } |
Lorenzo Colitti | 2de4925 | 2017-01-24 18:08:41 +0900 | [diff] [blame] | 1191 | |
| 1192 | @Override |
| 1193 | public int configMeteredMultipathPreference() { |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1194 | return mConfigMeteredMultipathPreference; |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 1195 | } |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1196 | } |
| 1197 | |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1198 | /** |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 1199 | * Wait up to TIMEOUT_MS for {@code conditionVariable} to open. |
| 1200 | * Fails if TIMEOUT_MS goes by before {@code conditionVariable} opens. |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1201 | */ |
| 1202 | static private void waitFor(ConditionVariable conditionVariable) { |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 1203 | if (conditionVariable.block(TIMEOUT_MS)) { |
| 1204 | return; |
| 1205 | } |
| 1206 | fail("ConditionVariable was blocked for more than " + TIMEOUT_MS + "ms"); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1207 | } |
| 1208 | |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 1209 | private static final int VPN_USER = 0; |
| 1210 | private static final int APP1_UID = UserHandle.getUid(VPN_USER, 10100); |
| 1211 | private static final int APP2_UID = UserHandle.getUid(VPN_USER, 10101); |
| 1212 | private static final int VPN_UID = UserHandle.getUid(VPN_USER, 10043); |
| 1213 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1214 | @Before |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1215 | public void setUp() throws Exception { |
Lorenzo Colitti | 590e296 | 2020-11-16 10:11:12 +0900 | [diff] [blame] | 1216 | mNetIdManager = new TestNetIdManager(); |
| 1217 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1218 | mContext = InstrumentationRegistry.getContext(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1219 | |
Hugo Benichi | 64901e5 | 2017-10-19 14:42:40 +0900 | [diff] [blame] | 1220 | MockitoAnnotations.initMocks(this); |
| 1221 | when(mMetricsService.defaultNetworkMetrics()).thenReturn(mDefaultNetworkMetrics); |
| 1222 | |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 1223 | when(mUserManager.getUsers(eq(true))).thenReturn( |
| 1224 | Arrays.asList(new UserInfo[] { |
| 1225 | new UserInfo(VPN_USER, "", 0), |
| 1226 | })); |
Qingxi Li | 9c5d8b9 | 2020-01-08 12:51:49 -0800 | [diff] [blame] | 1227 | final ApplicationInfo applicationInfo = new ApplicationInfo(); |
| 1228 | applicationInfo.targetSdkVersion = Build.VERSION_CODES.Q; |
| 1229 | when(mPackageManager.getApplicationInfoAsUser(anyString(), anyInt(), any())) |
| 1230 | .thenReturn(applicationInfo); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 1231 | |
Lorenzo Colitti | 2c1a253 | 2015-11-27 10:52:10 +0900 | [diff] [blame] | 1232 | // InstrumentationTestRunner prepares a looper, but AndroidJUnitRunner does not. |
| 1233 | // http://b/25897652 . |
| 1234 | if (Looper.myLooper() == null) { |
| 1235 | Looper.prepare(); |
| 1236 | } |
Rubin Xu | 9e64dc0 | 2019-04-23 18:04:14 +0100 | [diff] [blame] | 1237 | mockDefaultPackages(); |
Lorenzo Colitti | 2c1a253 | 2015-11-27 10:52:10 +0900 | [diff] [blame] | 1238 | |
Remi NGUYEN VAN | 91a1cc1 | 2018-09-28 14:33:11 +0900 | [diff] [blame] | 1239 | FakeSettingsProvider.clearSettingsProvider(); |
| 1240 | mServiceContext = new MockContext(InstrumentationRegistry.getContext(), |
| 1241 | new FakeSettingsProvider()); |
Hugo Benichi | 938ab4f | 2017-02-11 17:04:43 +0900 | [diff] [blame] | 1242 | LocalServices.removeServiceForTest(NetworkPolicyManagerInternal.class); |
| 1243 | LocalServices.addService( |
| 1244 | NetworkPolicyManagerInternal.class, mock(NetworkPolicyManagerInternal.class)); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 1245 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1246 | mAlarmManagerThread = new HandlerThread("TestAlarmManager"); |
| 1247 | mAlarmManagerThread.start(); |
| 1248 | initAlarmManager(mAlarmManager, mAlarmManagerThread.getThreadHandler()); |
| 1249 | |
| 1250 | mCsHandlerThread = new HandlerThread("TestConnectivityService"); |
| 1251 | final ConnectivityService.Dependencies deps = makeDependencies(); |
| 1252 | mService = new ConnectivityService(mServiceContext, |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 1253 | mNetworkManagementService, |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 1254 | mStatsService, |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 1255 | mNpm, |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1256 | mMockDnsResolver, |
Chenbo Feng | 7f14dbc | 2018-11-08 17:36:21 -0800 | [diff] [blame] | 1257 | mock(IpConnectivityLog.class), |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 1258 | mMockNetd, |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1259 | deps); |
| 1260 | mService.mLingerDelayMs = TEST_LINGER_DELAY_MS; |
| 1261 | verify(deps).makeMultinetworkPolicyTracker(any(), any(), any()); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1262 | |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 1263 | final ArgumentCaptor<INetworkPolicyListener> policyListenerCaptor = |
| 1264 | ArgumentCaptor.forClass(INetworkPolicyListener.class); |
| 1265 | verify(mNpm).registerListener(policyListenerCaptor.capture()); |
| 1266 | mPolicyListener = policyListenerCaptor.getValue(); |
| 1267 | |
Jeff Sharkey | e0c2995 | 2018-02-20 17:24:55 -0700 | [diff] [blame] | 1268 | // Create local CM before sending system ready so that we can answer |
| 1269 | // getSystemService() correctly. |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1270 | mCm = new WrappedConnectivityManager(InstrumentationRegistry.getContext(), mService); |
Jeff Sharkey | e0c2995 | 2018-02-20 17:24:55 -0700 | [diff] [blame] | 1271 | mService.systemReady(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1272 | mockVpn(Process.myUid()); |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 1273 | mCm.bindProcessToNetwork(null); |
Calvin On | 1f64f3f | 2016-10-11 15:10:46 -0700 | [diff] [blame] | 1274 | |
| 1275 | // Ensure that the default setting for Captive Portals is used for most tests |
| 1276 | setCaptivePortalMode(Settings.Global.CAPTIVE_PORTAL_MODE_PROMPT); |
Leif Hendrik Wilden | fd30663 | 2018-05-02 12:05:24 -0700 | [diff] [blame] | 1277 | setAlwaysOnNetworks(false); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 1278 | setPrivateDnsSettings(PRIVATE_DNS_MODE_OFF, "ignored.example.com"); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1279 | } |
| 1280 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1281 | private ConnectivityService.Dependencies makeDependencies() { |
| 1282 | final MockableSystemProperties systemProperties = spy(new MockableSystemProperties()); |
| 1283 | when(systemProperties.getInt("net.tcp.default_init_rwnd", 0)).thenReturn(0); |
| 1284 | when(systemProperties.getBoolean("ro.radio.noril", false)).thenReturn(false); |
| 1285 | |
| 1286 | final ConnectivityService.Dependencies deps = mock(ConnectivityService.Dependencies.class); |
| 1287 | doReturn(mCsHandlerThread).when(deps).makeHandlerThread(); |
Lorenzo Colitti | 590e296 | 2020-11-16 10:11:12 +0900 | [diff] [blame] | 1288 | doReturn(mNetIdManager).when(deps).makeNetIdManager(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1289 | doReturn(mNetworkStack).when(deps).getNetworkStack(); |
| 1290 | doReturn(systemProperties).when(deps).getSystemProperties(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1291 | doReturn(mock(ProxyTracker.class)).when(deps).makeProxyTracker(any(), any()); |
| 1292 | doReturn(mMetricsService).when(deps).getMetricsLogger(); |
| 1293 | doReturn(true).when(deps).queryUserAccess(anyInt(), anyInt()); |
| 1294 | doReturn(mIpConnectivityMetrics).when(deps).getIpConnectivityMetrics(); |
Chalard Jean | 587758b | 2019-11-29 16:41:50 +0900 | [diff] [blame] | 1295 | doReturn(mBatteryStatsService).when(deps).getBatteryStatsService(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1296 | doReturn(true).when(deps).hasService(Context.ETHERNET_SERVICE); |
| 1297 | doAnswer(inv -> { |
| 1298 | mPolicyTracker = new WrappedMultinetworkPolicyTracker( |
| 1299 | inv.getArgument(0), inv.getArgument(1), inv.getArgument(2)); |
| 1300 | return mPolicyTracker; |
| 1301 | }).when(deps).makeMultinetworkPolicyTracker(any(), any(), any()); |
| 1302 | |
| 1303 | return deps; |
| 1304 | } |
| 1305 | |
| 1306 | private static void initAlarmManager(final AlarmManager am, final Handler alarmHandler) { |
| 1307 | doAnswer(inv -> { |
| 1308 | final long when = inv.getArgument(1); |
| 1309 | final WakeupMessage wakeupMsg = inv.getArgument(3); |
| 1310 | final Handler handler = inv.getArgument(4); |
| 1311 | |
| 1312 | long delayMs = when - SystemClock.elapsedRealtime(); |
| 1313 | if (delayMs < 0) delayMs = 0; |
| 1314 | if (delayMs > UNREASONABLY_LONG_ALARM_WAIT_MS) { |
| 1315 | fail("Attempting to send msg more than " + UNREASONABLY_LONG_ALARM_WAIT_MS |
| 1316 | + "ms into the future: " + delayMs); |
| 1317 | } |
| 1318 | alarmHandler.postDelayed(() -> handler.post(wakeupMsg::onAlarm), wakeupMsg /* token */, |
| 1319 | delayMs); |
| 1320 | |
| 1321 | return null; |
| 1322 | }).when(am).setExact(eq(AlarmManager.ELAPSED_REALTIME_WAKEUP), anyLong(), anyString(), |
| 1323 | any(WakeupMessage.class), any()); |
| 1324 | |
| 1325 | doAnswer(inv -> { |
| 1326 | final WakeupMessage wakeupMsg = inv.getArgument(0); |
| 1327 | alarmHandler.removeCallbacksAndMessages(wakeupMsg /* token */); |
| 1328 | return null; |
| 1329 | }).when(am).cancel(any(WakeupMessage.class)); |
| 1330 | } |
| 1331 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1332 | @After |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1333 | public void tearDown() throws Exception { |
Leif Hendrik Wilden | fd30663 | 2018-05-02 12:05:24 -0700 | [diff] [blame] | 1334 | setAlwaysOnNetworks(false); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 1335 | if (mCellNetworkAgent != null) { |
| 1336 | mCellNetworkAgent.disconnect(); |
| 1337 | mCellNetworkAgent = null; |
| 1338 | } |
| 1339 | if (mWiFiNetworkAgent != null) { |
| 1340 | mWiFiNetworkAgent.disconnect(); |
| 1341 | mWiFiNetworkAgent = null; |
| 1342 | } |
| 1343 | if (mEthernetNetworkAgent != null) { |
| 1344 | mEthernetNetworkAgent.disconnect(); |
| 1345 | mEthernetNetworkAgent = null; |
| 1346 | } |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 1347 | mMockVpn.disconnect(); |
| 1348 | waitForIdle(); |
| 1349 | |
Remi NGUYEN VAN | 91a1cc1 | 2018-09-28 14:33:11 +0900 | [diff] [blame] | 1350 | FakeSettingsProvider.clearSettingsProvider(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1351 | |
| 1352 | mCsHandlerThread.quitSafely(); |
| 1353 | mAlarmManagerThread.quitSafely(); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1354 | } |
| 1355 | |
Rubin Xu | 9e64dc0 | 2019-04-23 18:04:14 +0100 | [diff] [blame] | 1356 | private void mockDefaultPackages() throws Exception { |
| 1357 | final String testPackageName = mContext.getPackageName(); |
| 1358 | final PackageInfo testPackageInfo = mContext.getPackageManager().getPackageInfo( |
| 1359 | testPackageName, PackageManager.GET_PERMISSIONS); |
| 1360 | when(mPackageManager.getPackagesForUid(Binder.getCallingUid())).thenReturn( |
| 1361 | new String[] {testPackageName}); |
| 1362 | when(mPackageManager.getPackageInfoAsUser(eq(testPackageName), anyInt(), |
| 1363 | eq(UserHandle.getCallingUserId()))).thenReturn(testPackageInfo); |
| 1364 | |
| 1365 | when(mPackageManager.getInstalledPackages(eq(GET_PERMISSIONS | MATCH_ANY_USER))).thenReturn( |
| 1366 | Arrays.asList(new PackageInfo[] { |
| 1367 | buildPackageInfo(/* SYSTEM */ false, APP1_UID), |
| 1368 | buildPackageInfo(/* SYSTEM */ false, APP2_UID), |
| 1369 | buildPackageInfo(/* SYSTEM */ false, VPN_UID) |
| 1370 | })); |
| 1371 | } |
| 1372 | |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1373 | private void verifyActiveNetwork(int transport) { |
| 1374 | // Test getActiveNetworkInfo() |
| 1375 | assertNotNull(mCm.getActiveNetworkInfo()); |
| 1376 | assertEquals(transportToLegacyType(transport), mCm.getActiveNetworkInfo().getType()); |
| 1377 | // Test getActiveNetwork() |
| 1378 | assertNotNull(mCm.getActiveNetwork()); |
Robin Lee | d2baf79 | 2016-03-24 12:07:00 +0000 | [diff] [blame] | 1379 | assertEquals(mCm.getActiveNetwork(), mCm.getActiveNetworkForUid(Process.myUid())); |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 1380 | if (!NetworkCapabilities.isValidTransport(transport)) { |
| 1381 | throw new IllegalStateException("Unknown transport " + transport); |
| 1382 | } |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1383 | switch (transport) { |
| 1384 | case TRANSPORT_WIFI: |
| 1385 | assertEquals(mCm.getActiveNetwork(), mWiFiNetworkAgent.getNetwork()); |
| 1386 | break; |
| 1387 | case TRANSPORT_CELLULAR: |
| 1388 | assertEquals(mCm.getActiveNetwork(), mCellNetworkAgent.getNetwork()); |
| 1389 | break; |
| 1390 | default: |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 1391 | break; |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1392 | } |
| 1393 | // Test getNetworkInfo(Network) |
| 1394 | assertNotNull(mCm.getNetworkInfo(mCm.getActiveNetwork())); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 1395 | assertEquals(transportToLegacyType(transport), |
| 1396 | mCm.getNetworkInfo(mCm.getActiveNetwork()).getType()); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1397 | // Test getNetworkCapabilities(Network) |
| 1398 | assertNotNull(mCm.getNetworkCapabilities(mCm.getActiveNetwork())); |
| 1399 | assertTrue(mCm.getNetworkCapabilities(mCm.getActiveNetwork()).hasTransport(transport)); |
| 1400 | } |
| 1401 | |
| 1402 | private void verifyNoNetwork() { |
Hugo Benichi | c101450 | 2017-07-19 10:10:52 +0900 | [diff] [blame] | 1403 | waitForIdle(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1404 | // Test getActiveNetworkInfo() |
| 1405 | assertNull(mCm.getActiveNetworkInfo()); |
| 1406 | // Test getActiveNetwork() |
| 1407 | assertNull(mCm.getActiveNetwork()); |
Robin Lee | d2baf79 | 2016-03-24 12:07:00 +0000 | [diff] [blame] | 1408 | assertNull(mCm.getActiveNetworkForUid(Process.myUid())); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1409 | // Test getAllNetworks() |
Hugo Benichi | fed512a | 2017-06-26 10:06:49 +0900 | [diff] [blame] | 1410 | assertEmpty(mCm.getAllNetworks()); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1411 | } |
| 1412 | |
| 1413 | /** |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1414 | * Class to simplify expecting broadcasts using BroadcastInterceptingContext. |
| 1415 | * Ensures that the receiver is unregistered after the expected broadcast is received. This |
| 1416 | * cannot be done in the BroadcastReceiver itself because BroadcastInterceptingContext runs |
| 1417 | * the receivers' receive method while iterating over the list of receivers, and unregistering |
| 1418 | * the receiver during iteration throws ConcurrentModificationException. |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1419 | */ |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1420 | private class ExpectedBroadcast extends CompletableFuture<Intent> { |
| 1421 | private final BroadcastReceiver mReceiver; |
| 1422 | |
| 1423 | ExpectedBroadcast(BroadcastReceiver receiver) { |
| 1424 | mReceiver = receiver; |
| 1425 | } |
| 1426 | |
| 1427 | public Intent expectBroadcast(int timeoutMs) throws Exception { |
| 1428 | try { |
| 1429 | return get(timeoutMs, TimeUnit.MILLISECONDS); |
| 1430 | } catch (TimeoutException e) { |
| 1431 | fail("Expected broadcast not received after " + timeoutMs + " ms"); |
| 1432 | return null; |
| 1433 | } finally { |
| 1434 | mServiceContext.unregisterReceiver(mReceiver); |
| 1435 | } |
| 1436 | } |
| 1437 | |
| 1438 | public Intent expectBroadcast() throws Exception { |
| 1439 | return expectBroadcast(TIMEOUT_MS); |
| 1440 | } |
| 1441 | |
| 1442 | public void expectNoBroadcast(int timeoutMs) throws Exception { |
| 1443 | waitForIdle(); |
| 1444 | try { |
| 1445 | final Intent intent = get(timeoutMs, TimeUnit.MILLISECONDS); |
| 1446 | fail("Unexpected broadcast: " + intent.getAction()); |
| 1447 | } catch (TimeoutException expected) { |
| 1448 | } finally { |
| 1449 | mServiceContext.unregisterReceiver(mReceiver); |
| 1450 | } |
| 1451 | } |
| 1452 | } |
| 1453 | |
| 1454 | /** Expects that {@code count} CONNECTIVITY_ACTION broadcasts are received. */ |
| 1455 | private ExpectedBroadcast registerConnectivityBroadcast(final int count) { |
Chalard Jean | 407deb7 | 2019-11-19 16:14:30 +0900 | [diff] [blame] | 1456 | return registerConnectivityBroadcastThat(count, intent -> true); |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 1457 | } |
| 1458 | |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1459 | private ExpectedBroadcast registerConnectivityBroadcastThat(final int count, |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 1460 | @NonNull final Predicate<Intent> filter) { |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 1461 | final IntentFilter intentFilter = new IntentFilter(CONNECTIVITY_ACTION); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1462 | // AtomicReference allows receiver to access expected even though it is constructed later. |
| 1463 | final AtomicReference<ExpectedBroadcast> expectedRef = new AtomicReference<>(); |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 1464 | final BroadcastReceiver receiver = new BroadcastReceiver() { |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1465 | private int mRemaining = count; |
| 1466 | public void onReceive(Context context, Intent intent) { |
| 1467 | final int type = intent.getIntExtra(EXTRA_NETWORK_TYPE, -1); |
| 1468 | final NetworkInfo ni = intent.getParcelableExtra(EXTRA_NETWORK_INFO); |
| 1469 | Log.d(TAG, "Received CONNECTIVITY_ACTION type=" + type + " ni=" + ni); |
| 1470 | if (!filter.test(intent)) return; |
| 1471 | if (--mRemaining == 0) { |
| 1472 | expectedRef.get().complete(intent); |
| 1473 | } |
| 1474 | } |
| 1475 | }; |
| 1476 | final ExpectedBroadcast expected = new ExpectedBroadcast(receiver); |
| 1477 | expectedRef.set(expected); |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 1478 | mServiceContext.registerReceiver(receiver, intentFilter); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1479 | return expected; |
| 1480 | } |
| 1481 | |
| 1482 | private ExpectedBroadcast expectConnectivityAction(int type, NetworkInfo.DetailedState state) { |
| 1483 | return registerConnectivityBroadcastThat(1, intent -> |
| 1484 | type == intent.getIntExtra(EXTRA_NETWORK_TYPE, -1) && state.equals( |
| 1485 | ((NetworkInfo) intent.getParcelableExtra(EXTRA_NETWORK_INFO)) |
| 1486 | .getDetailedState())); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1487 | } |
| 1488 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1489 | @Test |
Lorenzo Colitti | 42cdf57 | 2017-03-21 18:54:11 +0900 | [diff] [blame] | 1490 | public void testNetworkTypes() { |
| 1491 | // Ensure that our mocks for the networkAttributes config variable work as expected. If they |
| 1492 | // don't, then tests that depend on CONNECTIVITY_ACTION broadcasts for these network types |
| 1493 | // will fail. Failing here is much easier to debug. |
| 1494 | assertTrue(mCm.isNetworkSupported(TYPE_WIFI)); |
| 1495 | assertTrue(mCm.isNetworkSupported(TYPE_MOBILE)); |
Lorenzo Colitti | 7bbe3ee | 2017-08-24 22:35:10 +0900 | [diff] [blame] | 1496 | assertTrue(mCm.isNetworkSupported(TYPE_MOBILE_MMS)); |
| 1497 | assertFalse(mCm.isNetworkSupported(TYPE_MOBILE_FOTA)); |
| 1498 | |
| 1499 | // Check that TYPE_ETHERNET is supported. Unlike the asserts above, which only validate our |
| 1500 | // mocks, this assert exercises the ConnectivityService code path that ensures that |
| 1501 | // TYPE_ETHERNET is supported if the ethernet service is running. |
| 1502 | assertTrue(mCm.isNetworkSupported(TYPE_ETHERNET)); |
Lorenzo Colitti | 42cdf57 | 2017-03-21 18:54:11 +0900 | [diff] [blame] | 1503 | } |
| 1504 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1505 | @Test |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 1506 | public void testNetworkFeature() throws Exception { |
| 1507 | // Connect the cell agent and wait for the connected broadcast. |
| 1508 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
| 1509 | mCellNetworkAgent.addCapability(NET_CAPABILITY_SUPL); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1510 | ExpectedBroadcast b = expectConnectivityAction(TYPE_MOBILE, DetailedState.CONNECTED); |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 1511 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1512 | b.expectBroadcast(); |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 1513 | |
| 1514 | // Build legacy request for SUPL. |
| 1515 | final NetworkCapabilities legacyCaps = new NetworkCapabilities(); |
| 1516 | legacyCaps.addTransportType(TRANSPORT_CELLULAR); |
| 1517 | legacyCaps.addCapability(NET_CAPABILITY_SUPL); |
| 1518 | final NetworkRequest legacyRequest = new NetworkRequest(legacyCaps, TYPE_MOBILE_SUPL, |
| 1519 | ConnectivityManager.REQUEST_ID_UNSET, NetworkRequest.Type.REQUEST); |
| 1520 | |
Automerger Merge Worker | d40f64b | 2020-03-19 02:48:22 +0000 | [diff] [blame] | 1521 | // File request, withdraw it and make sure no broadcast is sent |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1522 | b = registerConnectivityBroadcast(1); |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 1523 | final TestNetworkCallback callback = new TestNetworkCallback(); |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 1524 | mCm.requestNetwork(legacyRequest, callback); |
| 1525 | callback.expectCallback(CallbackEntry.AVAILABLE, mCellNetworkAgent); |
Automerger Merge Worker | d40f64b | 2020-03-19 02:48:22 +0000 | [diff] [blame] | 1526 | mCm.unregisterNetworkCallback(callback); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1527 | b.expectNoBroadcast(800); // 800ms long enough to at least flake if this is sent |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 1528 | |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1529 | // Disconnect the network and expect mobile disconnected broadcast. |
| 1530 | b = expectConnectivityAction(TYPE_MOBILE, DetailedState.DISCONNECTED); |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 1531 | mCellNetworkAgent.disconnect(); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1532 | b.expectBroadcast(); |
Chalard Jean | 9ca1377 | 2019-11-15 12:08:36 +0900 | [diff] [blame] | 1533 | } |
| 1534 | |
| 1535 | @Test |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1536 | public void testLingering() throws Exception { |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1537 | verifyNoNetwork(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1538 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
| 1539 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1540 | assertNull(mCm.getActiveNetworkInfo()); |
| 1541 | assertNull(mCm.getActiveNetwork()); |
| 1542 | // Test bringing up validated cellular. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1543 | ExpectedBroadcast b = expectConnectivityAction(TYPE_MOBILE, DetailedState.CONNECTED); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1544 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1545 | b.expectBroadcast(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1546 | verifyActiveNetwork(TRANSPORT_CELLULAR); |
Hugo Benichi | fed512a | 2017-06-26 10:06:49 +0900 | [diff] [blame] | 1547 | assertLength(2, mCm.getAllNetworks()); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1548 | assertTrue(mCm.getAllNetworks()[0].equals(mCm.getActiveNetwork()) || |
| 1549 | mCm.getAllNetworks()[1].equals(mCm.getActiveNetwork())); |
| 1550 | assertTrue(mCm.getAllNetworks()[0].equals(mWiFiNetworkAgent.getNetwork()) || |
| 1551 | mCm.getAllNetworks()[1].equals(mWiFiNetworkAgent.getNetwork())); |
| 1552 | // Test bringing up validated WiFi. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1553 | b = registerConnectivityBroadcast(2); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1554 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1555 | b.expectBroadcast(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1556 | verifyActiveNetwork(TRANSPORT_WIFI); |
Hugo Benichi | fed512a | 2017-06-26 10:06:49 +0900 | [diff] [blame] | 1557 | assertLength(2, mCm.getAllNetworks()); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1558 | assertTrue(mCm.getAllNetworks()[0].equals(mCm.getActiveNetwork()) || |
| 1559 | mCm.getAllNetworks()[1].equals(mCm.getActiveNetwork())); |
| 1560 | assertTrue(mCm.getAllNetworks()[0].equals(mCellNetworkAgent.getNetwork()) || |
| 1561 | mCm.getAllNetworks()[1].equals(mCellNetworkAgent.getNetwork())); |
| 1562 | // Test cellular linger timeout. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1563 | mCellNetworkAgent.expectDisconnected(); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 1564 | waitForIdle(); |
Hugo Benichi | fed512a | 2017-06-26 10:06:49 +0900 | [diff] [blame] | 1565 | assertLength(1, mCm.getAllNetworks()); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1566 | verifyActiveNetwork(TRANSPORT_WIFI); |
Hugo Benichi | fed512a | 2017-06-26 10:06:49 +0900 | [diff] [blame] | 1567 | assertLength(1, mCm.getAllNetworks()); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1568 | assertEquals(mCm.getAllNetworks()[0], mCm.getActiveNetwork()); |
| 1569 | // Test WiFi disconnect. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1570 | b = registerConnectivityBroadcast(1); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1571 | mWiFiNetworkAgent.disconnect(); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1572 | b.expectBroadcast(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1573 | verifyNoNetwork(); |
| 1574 | } |
| 1575 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1576 | @Test |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1577 | public void testValidatedCellularOutscoresUnvalidatedWiFi() throws Exception { |
| 1578 | // Test bringing up unvalidated WiFi |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1579 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1580 | ExpectedBroadcast b = registerConnectivityBroadcast(1); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1581 | mWiFiNetworkAgent.connect(false); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1582 | b.expectBroadcast(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1583 | verifyActiveNetwork(TRANSPORT_WIFI); |
| 1584 | // Test bringing up unvalidated cellular |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1585 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1586 | mCellNetworkAgent.connect(false); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 1587 | waitForIdle(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1588 | verifyActiveNetwork(TRANSPORT_WIFI); |
| 1589 | // Test cellular disconnect. |
| 1590 | mCellNetworkAgent.disconnect(); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 1591 | waitForIdle(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1592 | verifyActiveNetwork(TRANSPORT_WIFI); |
| 1593 | // Test bringing up validated cellular |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1594 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1595 | b = registerConnectivityBroadcast(2); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1596 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1597 | b.expectBroadcast(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1598 | verifyActiveNetwork(TRANSPORT_CELLULAR); |
| 1599 | // Test cellular disconnect. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1600 | b = registerConnectivityBroadcast(2); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1601 | mCellNetworkAgent.disconnect(); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1602 | b.expectBroadcast(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1603 | verifyActiveNetwork(TRANSPORT_WIFI); |
| 1604 | // Test WiFi disconnect. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1605 | b = registerConnectivityBroadcast(1); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1606 | mWiFiNetworkAgent.disconnect(); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1607 | b.expectBroadcast(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1608 | verifyNoNetwork(); |
| 1609 | } |
| 1610 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1611 | @Test |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1612 | public void testUnvalidatedWifiOutscoresUnvalidatedCellular() throws Exception { |
| 1613 | // Test bringing up unvalidated cellular. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1614 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1615 | ExpectedBroadcast b = registerConnectivityBroadcast(1); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1616 | mCellNetworkAgent.connect(false); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1617 | b.expectBroadcast(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1618 | verifyActiveNetwork(TRANSPORT_CELLULAR); |
| 1619 | // Test bringing up unvalidated WiFi. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1620 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1621 | b = registerConnectivityBroadcast(2); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1622 | mWiFiNetworkAgent.connect(false); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1623 | b.expectBroadcast(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1624 | verifyActiveNetwork(TRANSPORT_WIFI); |
| 1625 | // Test WiFi disconnect. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1626 | b = registerConnectivityBroadcast(2); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1627 | mWiFiNetworkAgent.disconnect(); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1628 | b.expectBroadcast(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1629 | verifyActiveNetwork(TRANSPORT_CELLULAR); |
| 1630 | // Test cellular disconnect. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1631 | b = registerConnectivityBroadcast(1); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1632 | mCellNetworkAgent.disconnect(); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1633 | b.expectBroadcast(); |
Paul Jensen | d7b6ca9 | 2015-05-13 14:05:12 -0400 | [diff] [blame] | 1634 | verifyNoNetwork(); |
| 1635 | } |
| 1636 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1637 | @Test |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1638 | public void testUnlingeringDoesNotValidate() throws Exception { |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 1639 | // Test bringing up unvalidated WiFi. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1640 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1641 | ExpectedBroadcast b = registerConnectivityBroadcast(1); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 1642 | mWiFiNetworkAgent.connect(false); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1643 | b.expectBroadcast(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1644 | verifyActiveNetwork(TRANSPORT_WIFI); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 1645 | assertFalse(mCm.getNetworkCapabilities(mWiFiNetworkAgent.getNetwork()).hasCapability( |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1646 | NET_CAPABILITY_VALIDATED)); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 1647 | // Test bringing up validated cellular. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1648 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1649 | b = registerConnectivityBroadcast(2); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 1650 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1651 | b.expectBroadcast(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1652 | verifyActiveNetwork(TRANSPORT_CELLULAR); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 1653 | assertFalse(mCm.getNetworkCapabilities(mWiFiNetworkAgent.getNetwork()).hasCapability( |
| 1654 | NET_CAPABILITY_VALIDATED)); |
| 1655 | // Test cellular disconnect. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1656 | b = registerConnectivityBroadcast(2); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 1657 | mCellNetworkAgent.disconnect(); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1658 | b.expectBroadcast(); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 1659 | verifyActiveNetwork(TRANSPORT_WIFI); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1660 | // Unlingering a network should not cause it to be marked as validated. |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 1661 | assertFalse(mCm.getNetworkCapabilities(mWiFiNetworkAgent.getNetwork()).hasCapability( |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1662 | NET_CAPABILITY_VALIDATED)); |
| 1663 | } |
| 1664 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1665 | @Test |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1666 | public void testCellularOutscoresWeakWifi() throws Exception { |
| 1667 | // Test bringing up validated cellular. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1668 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1669 | ExpectedBroadcast b = registerConnectivityBroadcast(1); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1670 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1671 | b.expectBroadcast(); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1672 | verifyActiveNetwork(TRANSPORT_CELLULAR); |
| 1673 | // Test bringing up validated WiFi. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1674 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1675 | b = registerConnectivityBroadcast(2); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1676 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1677 | b.expectBroadcast(); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1678 | verifyActiveNetwork(TRANSPORT_WIFI); |
| 1679 | // Test WiFi getting really weak. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1680 | b = registerConnectivityBroadcast(2); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1681 | mWiFiNetworkAgent.adjustScore(-11); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1682 | b.expectBroadcast(); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1683 | verifyActiveNetwork(TRANSPORT_CELLULAR); |
| 1684 | // Test WiFi restoring signal strength. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1685 | b = registerConnectivityBroadcast(2); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1686 | mWiFiNetworkAgent.adjustScore(11); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1687 | b.expectBroadcast(); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1688 | verifyActiveNetwork(TRANSPORT_WIFI); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1689 | } |
| 1690 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1691 | @Test |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1692 | public void testReapingNetwork() throws Exception { |
| 1693 | // Test bringing up WiFi without NET_CAPABILITY_INTERNET. |
| 1694 | // Expect it to be torn down immediately because it satisfies no requests. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1695 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1696 | mWiFiNetworkAgent.connectWithoutInternet(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1697 | mWiFiNetworkAgent.expectDisconnected(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1698 | // Test bringing up cellular without NET_CAPABILITY_INTERNET. |
| 1699 | // Expect it to be torn down immediately because it satisfies no requests. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1700 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1701 | mCellNetworkAgent.connectWithoutInternet(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1702 | mCellNetworkAgent.expectDisconnected(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1703 | // Test bringing up validated WiFi. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1704 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1705 | final ExpectedBroadcast b = expectConnectivityAction(TYPE_WIFI, DetailedState.CONNECTED); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1706 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1707 | b.expectBroadcast(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1708 | verifyActiveNetwork(TRANSPORT_WIFI); |
| 1709 | // Test bringing up unvalidated cellular. |
| 1710 | // Expect it to be torn down because it could never be the highest scoring network |
| 1711 | // satisfying the default request even if it validated. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1712 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1713 | mCellNetworkAgent.connect(false); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1714 | mCellNetworkAgent.expectDisconnected(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1715 | verifyActiveNetwork(TRANSPORT_WIFI); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1716 | mWiFiNetworkAgent.disconnect(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1717 | mWiFiNetworkAgent.expectDisconnected(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1718 | } |
| 1719 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1720 | @Test |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1721 | public void testCellularFallback() throws Exception { |
| 1722 | // Test bringing up validated cellular. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1723 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1724 | ExpectedBroadcast b = registerConnectivityBroadcast(1); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1725 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1726 | b.expectBroadcast(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1727 | verifyActiveNetwork(TRANSPORT_CELLULAR); |
| 1728 | // Test bringing up validated WiFi. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1729 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1730 | b = registerConnectivityBroadcast(2); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1731 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1732 | b.expectBroadcast(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1733 | verifyActiveNetwork(TRANSPORT_WIFI); |
| 1734 | // Reevaluate WiFi (it'll instantly fail DNS). |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1735 | b = registerConnectivityBroadcast(2); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1736 | assertTrue(mCm.getNetworkCapabilities(mWiFiNetworkAgent.getNetwork()).hasCapability( |
| 1737 | NET_CAPABILITY_VALIDATED)); |
| 1738 | mCm.reportBadNetwork(mWiFiNetworkAgent.getNetwork()); |
| 1739 | // Should quickly fall back to Cellular. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1740 | b.expectBroadcast(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1741 | assertFalse(mCm.getNetworkCapabilities(mWiFiNetworkAgent.getNetwork()).hasCapability( |
| 1742 | NET_CAPABILITY_VALIDATED)); |
| 1743 | verifyActiveNetwork(TRANSPORT_CELLULAR); |
| 1744 | // Reevaluate cellular (it'll instantly fail DNS). |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1745 | b = registerConnectivityBroadcast(2); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1746 | assertTrue(mCm.getNetworkCapabilities(mCellNetworkAgent.getNetwork()).hasCapability( |
| 1747 | NET_CAPABILITY_VALIDATED)); |
| 1748 | mCm.reportBadNetwork(mCellNetworkAgent.getNetwork()); |
| 1749 | // Should quickly fall back to WiFi. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1750 | b.expectBroadcast(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1751 | assertFalse(mCm.getNetworkCapabilities(mCellNetworkAgent.getNetwork()).hasCapability( |
| 1752 | NET_CAPABILITY_VALIDATED)); |
| 1753 | assertFalse(mCm.getNetworkCapabilities(mWiFiNetworkAgent.getNetwork()).hasCapability( |
| 1754 | NET_CAPABILITY_VALIDATED)); |
| 1755 | verifyActiveNetwork(TRANSPORT_WIFI); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1756 | } |
| 1757 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1758 | @Test |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1759 | public void testWiFiFallback() throws Exception { |
| 1760 | // Test bringing up unvalidated WiFi. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1761 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1762 | ExpectedBroadcast b = registerConnectivityBroadcast(1); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1763 | mWiFiNetworkAgent.connect(false); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1764 | b.expectBroadcast(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1765 | verifyActiveNetwork(TRANSPORT_WIFI); |
| 1766 | // Test bringing up validated cellular. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1767 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1768 | b = registerConnectivityBroadcast(2); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1769 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1770 | b.expectBroadcast(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1771 | verifyActiveNetwork(TRANSPORT_CELLULAR); |
| 1772 | // Reevaluate cellular (it'll instantly fail DNS). |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1773 | b = registerConnectivityBroadcast(2); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1774 | assertTrue(mCm.getNetworkCapabilities(mCellNetworkAgent.getNetwork()).hasCapability( |
| 1775 | NET_CAPABILITY_VALIDATED)); |
| 1776 | mCm.reportBadNetwork(mCellNetworkAgent.getNetwork()); |
| 1777 | // Should quickly fall back to WiFi. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1778 | b.expectBroadcast(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1779 | assertFalse(mCm.getNetworkCapabilities(mCellNetworkAgent.getNetwork()).hasCapability( |
| 1780 | NET_CAPABILITY_VALIDATED)); |
| 1781 | verifyActiveNetwork(TRANSPORT_WIFI); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 1782 | } |
| 1783 | |
Lorenzo Colitti | ed3168e | 2019-01-23 17:54:08 +0900 | [diff] [blame] | 1784 | @Test |
| 1785 | public void testRequiresValidation() { |
| 1786 | assertTrue(NetworkMonitorUtils.isValidationRequired( |
| 1787 | mCm.getDefaultRequest().networkCapabilities)); |
| 1788 | } |
| 1789 | |
Lorenzo Colitti | 83fa258 | 2015-08-07 12:49:01 +0900 | [diff] [blame] | 1790 | /** |
| 1791 | * Utility NetworkCallback for testing. The caller must explicitly test for all the callbacks |
| 1792 | * this class receives, by calling expectCallback() exactly once each time a callback is |
| 1793 | * received. assertNoCallback may be called at any time. |
| 1794 | */ |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 1795 | private class TestNetworkCallback extends TestableNetworkCallback { |
Chalard Jean | b299b84 | 2019-09-27 17:13:14 +0900 | [diff] [blame] | 1796 | TestNetworkCallback() { |
| 1797 | super(TEST_CALLBACK_TIMEOUT_MS); |
| 1798 | } |
| 1799 | |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 1800 | @Override |
| 1801 | public void assertNoCallback() { |
| 1802 | // TODO: better support this use case in TestableNetworkCallback |
| 1803 | waitForIdle(); |
| 1804 | assertNoCallback(0 /* timeout */); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1805 | } |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1806 | |
Erik Kline | acdd639 | 2016-07-07 16:50:58 +0900 | [diff] [blame] | 1807 | @Override |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 1808 | public <T extends CallbackEntry> T expectCallback(final KClass<T> type, final HasNetwork n, |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 1809 | final long timeoutMs) { |
| 1810 | final T callback = super.expectCallback(type, n, timeoutMs); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 1811 | if (callback instanceof CallbackEntry.Losing) { |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 1812 | // TODO : move this to the specific test(s) needing this rather than here. |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 1813 | final CallbackEntry.Losing losing = (CallbackEntry.Losing) callback; |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 1814 | final int maxMsToLive = losing.getMaxMsToLive(); |
Lorenzo Colitti | b57578ca | 2016-07-01 01:53:25 +0900 | [diff] [blame] | 1815 | String msg = String.format( |
| 1816 | "Invalid linger time value %d, must be between %d and %d", |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 1817 | maxMsToLive, 0, mService.mLingerDelayMs); |
Remi NGUYEN VAN | 605f12d | 2018-07-11 18:17:06 +0900 | [diff] [blame] | 1818 | assertTrue(msg, 0 <= maxMsToLive && maxMsToLive <= mService.mLingerDelayMs); |
Lorenzo Colitti | b57578ca | 2016-07-01 01:53:25 +0900 | [diff] [blame] | 1819 | } |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 1820 | return callback; |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1821 | } |
| 1822 | } |
| 1823 | |
| 1824 | // Can't be part of TestNetworkCallback because "cannot be declared static; static methods can |
| 1825 | // only be declared in a static or top level type". |
| 1826 | static void assertNoCallbacks(TestNetworkCallback ... callbacks) { |
| 1827 | for (TestNetworkCallback c : callbacks) { |
| 1828 | c.assertNoCallback(); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1829 | } |
| 1830 | } |
| 1831 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1832 | @Test |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1833 | public void testStateChangeNetworkCallbacks() throws Exception { |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1834 | final TestNetworkCallback genericNetworkCallback = new TestNetworkCallback(); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1835 | final TestNetworkCallback wifiNetworkCallback = new TestNetworkCallback(); |
| 1836 | final TestNetworkCallback cellNetworkCallback = new TestNetworkCallback(); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1837 | final NetworkRequest genericRequest = new NetworkRequest.Builder() |
| 1838 | .clearCapabilities().build(); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1839 | final NetworkRequest wifiRequest = new NetworkRequest.Builder() |
| 1840 | .addTransportType(TRANSPORT_WIFI).build(); |
| 1841 | final NetworkRequest cellRequest = new NetworkRequest.Builder() |
| 1842 | .addTransportType(TRANSPORT_CELLULAR).build(); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1843 | mCm.registerNetworkCallback(genericRequest, genericNetworkCallback); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1844 | mCm.registerNetworkCallback(wifiRequest, wifiNetworkCallback); |
| 1845 | mCm.registerNetworkCallback(cellRequest, cellNetworkCallback); |
| 1846 | |
| 1847 | // Test unvalidated networks |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1848 | ExpectedBroadcast b = registerConnectivityBroadcast(1); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1849 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1850 | mCellNetworkAgent.connect(false); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 1851 | genericNetworkCallback.expectAvailableCallbacksUnvalidated(mCellNetworkAgent); |
| 1852 | cellNetworkCallback.expectAvailableCallbacksUnvalidated(mCellNetworkAgent); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1853 | assertEquals(mCellNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1854 | b.expectBroadcast(); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1855 | assertNoCallbacks(genericNetworkCallback, wifiNetworkCallback, cellNetworkCallback); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1856 | |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1857 | // This should not trigger spurious onAvailable() callbacks, b/21762680. |
| 1858 | mCellNetworkAgent.adjustScore(-1); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 1859 | waitForIdle(); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1860 | assertNoCallbacks(genericNetworkCallback, wifiNetworkCallback, cellNetworkCallback); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1861 | assertEquals(mCellNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 1862 | |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1863 | b = registerConnectivityBroadcast(2); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1864 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1865 | mWiFiNetworkAgent.connect(false); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 1866 | genericNetworkCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
| 1867 | wifiNetworkCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1868 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1869 | b.expectBroadcast(); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1870 | assertNoCallbacks(genericNetworkCallback, wifiNetworkCallback, cellNetworkCallback); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1871 | |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1872 | b = registerConnectivityBroadcast(2); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1873 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 1874 | genericNetworkCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
| 1875 | wifiNetworkCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 83fa258 | 2015-08-07 12:49:01 +0900 | [diff] [blame] | 1876 | cellNetworkCallback.assertNoCallback(); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1877 | b.expectBroadcast(); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1878 | assertNoCallbacks(genericNetworkCallback, wifiNetworkCallback, cellNetworkCallback); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1879 | |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1880 | b = registerConnectivityBroadcast(1); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1881 | mCellNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 1882 | genericNetworkCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
| 1883 | cellNetworkCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 1884 | b.expectBroadcast(); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1885 | assertNoCallbacks(genericNetworkCallback, wifiNetworkCallback, cellNetworkCallback); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1886 | |
| 1887 | // Test validated networks |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1888 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1889 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 1890 | genericNetworkCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
| 1891 | cellNetworkCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1892 | assertEquals(mCellNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1893 | assertNoCallbacks(genericNetworkCallback, wifiNetworkCallback, cellNetworkCallback); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1894 | |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1895 | // This should not trigger spurious onAvailable() callbacks, b/21762680. |
| 1896 | mCellNetworkAgent.adjustScore(-1); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 1897 | waitForIdle(); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1898 | assertNoCallbacks(genericNetworkCallback, wifiNetworkCallback, cellNetworkCallback); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1899 | assertEquals(mCellNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 1900 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 1901 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1902 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 1903 | genericNetworkCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 1904 | genericNetworkCallback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 1905 | genericNetworkCallback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 1906 | wifiNetworkCallback.expectAvailableThenValidatedCallbacks(mWiFiNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 1907 | cellNetworkCallback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1908 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1909 | assertNoCallbacks(genericNetworkCallback, wifiNetworkCallback, cellNetworkCallback); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1910 | |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1911 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 1912 | genericNetworkCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
| 1913 | wifiNetworkCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1914 | assertNoCallbacks(genericNetworkCallback, wifiNetworkCallback, cellNetworkCallback); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1915 | |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1916 | mCellNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 1917 | genericNetworkCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
| 1918 | cellNetworkCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 1919 | assertNoCallbacks(genericNetworkCallback, wifiNetworkCallback, cellNetworkCallback); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 1920 | } |
| 1921 | |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 1922 | private void doNetworkCallbacksSanitizationTest(boolean sanitized) throws Exception { |
| 1923 | final TestNetworkCallback callback = new TestNetworkCallback(); |
| 1924 | final TestNetworkCallback defaultCallback = new TestNetworkCallback(); |
| 1925 | final NetworkRequest wifiRequest = new NetworkRequest.Builder() |
| 1926 | .addTransportType(TRANSPORT_WIFI).build(); |
| 1927 | mCm.registerNetworkCallback(wifiRequest, callback); |
| 1928 | mCm.registerDefaultNetworkCallback(defaultCallback); |
| 1929 | |
| 1930 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
| 1931 | mWiFiNetworkAgent.connect(false); |
| 1932 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
| 1933 | defaultCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
| 1934 | |
| 1935 | final LinkProperties newLp = new LinkProperties(); |
| 1936 | final Uri capportUrl = Uri.parse("https://capport.example.com/api"); |
| 1937 | final CaptivePortalData capportData = new CaptivePortalData.Builder() |
| 1938 | .setCaptive(true).build(); |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 1939 | |
| 1940 | final Uri expectedCapportUrl = sanitized ? null : capportUrl; |
Remi NGUYEN VAN | 91aa5bc | 2019-12-12 12:57:11 +0900 | [diff] [blame] | 1941 | newLp.setCaptivePortalApiUrl(capportUrl); |
| 1942 | mWiFiNetworkAgent.sendLinkProperties(newLp); |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 1943 | callback.expectLinkPropertiesThat(mWiFiNetworkAgent, lp -> |
Remi NGUYEN VAN | 91aa5bc | 2019-12-12 12:57:11 +0900 | [diff] [blame] | 1944 | Objects.equals(expectedCapportUrl, lp.getCaptivePortalApiUrl())); |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 1945 | defaultCallback.expectLinkPropertiesThat(mWiFiNetworkAgent, lp -> |
Remi NGUYEN VAN | 91aa5bc | 2019-12-12 12:57:11 +0900 | [diff] [blame] | 1946 | Objects.equals(expectedCapportUrl, lp.getCaptivePortalApiUrl())); |
| 1947 | |
| 1948 | final CaptivePortalData expectedCapportData = sanitized ? null : capportData; |
| 1949 | mWiFiNetworkAgent.notifyCaptivePortalDataChanged(capportData); |
| 1950 | callback.expectLinkPropertiesThat(mWiFiNetworkAgent, lp -> |
| 1951 | Objects.equals(expectedCapportData, lp.getCaptivePortalData())); |
| 1952 | defaultCallback.expectLinkPropertiesThat(mWiFiNetworkAgent, lp -> |
| 1953 | Objects.equals(expectedCapportData, lp.getCaptivePortalData())); |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 1954 | |
| 1955 | final LinkProperties lp = mCm.getLinkProperties(mWiFiNetworkAgent.getNetwork()); |
| 1956 | assertEquals(expectedCapportUrl, lp.getCaptivePortalApiUrl()); |
| 1957 | assertEquals(expectedCapportData, lp.getCaptivePortalData()); |
| 1958 | } |
| 1959 | |
| 1960 | @Test |
| 1961 | public void networkCallbacksSanitizationTest_Sanitize() throws Exception { |
| 1962 | mServiceContext.setPermission(NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK, |
| 1963 | PERMISSION_DENIED); |
| 1964 | mServiceContext.setPermission(Manifest.permission.NETWORK_SETTINGS, |
| 1965 | PERMISSION_DENIED); |
| 1966 | doNetworkCallbacksSanitizationTest(true /* sanitized */); |
| 1967 | } |
| 1968 | |
| 1969 | @Test |
| 1970 | public void networkCallbacksSanitizationTest_NoSanitize_NetworkStack() throws Exception { |
| 1971 | mServiceContext.setPermission(NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK, |
| 1972 | PERMISSION_GRANTED); |
| 1973 | mServiceContext.setPermission(Manifest.permission.NETWORK_SETTINGS, PERMISSION_DENIED); |
| 1974 | doNetworkCallbacksSanitizationTest(false /* sanitized */); |
| 1975 | } |
| 1976 | |
| 1977 | @Test |
| 1978 | public void networkCallbacksSanitizationTest_NoSanitize_Settings() throws Exception { |
| 1979 | mServiceContext.setPermission(NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK, |
| 1980 | PERMISSION_DENIED); |
| 1981 | mServiceContext.setPermission(Manifest.permission.NETWORK_SETTINGS, PERMISSION_GRANTED); |
| 1982 | doNetworkCallbacksSanitizationTest(false /* sanitized */); |
| 1983 | } |
| 1984 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 1985 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 1986 | public void testMultipleLingering() throws Exception { |
Remi NGUYEN VAN | 605f12d | 2018-07-11 18:17:06 +0900 | [diff] [blame] | 1987 | // This test would be flaky with the default 120ms timer: that is short enough that |
| 1988 | // lingered networks are torn down before assertions can be run. We don't want to mock the |
| 1989 | // lingering timer to keep the WakeupMessage logic realistic: this has already proven useful |
| 1990 | // in detecting races. |
| 1991 | mService.mLingerDelayMs = 300; |
| 1992 | |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 1993 | NetworkRequest request = new NetworkRequest.Builder() |
| 1994 | .clearCapabilities().addCapability(NET_CAPABILITY_NOT_METERED) |
| 1995 | .build(); |
| 1996 | TestNetworkCallback callback = new TestNetworkCallback(); |
| 1997 | mCm.registerNetworkCallback(request, callback); |
| 1998 | |
| 1999 | TestNetworkCallback defaultCallback = new TestNetworkCallback(); |
| 2000 | mCm.registerDefaultNetworkCallback(defaultCallback); |
| 2001 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2002 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
| 2003 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
| 2004 | mEthernetNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_ETHERNET); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2005 | |
| 2006 | mCellNetworkAgent.addCapability(NET_CAPABILITY_NOT_METERED); |
| 2007 | mWiFiNetworkAgent.addCapability(NET_CAPABILITY_NOT_METERED); |
| 2008 | mEthernetNetworkAgent.addCapability(NET_CAPABILITY_NOT_METERED); |
| 2009 | |
| 2010 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2011 | callback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
| 2012 | defaultCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2013 | assertEquals(mCellNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2014 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2015 | |
| 2016 | mWiFiNetworkAgent.connect(true); |
| 2017 | // We get AVAILABLE on wifi when wifi connects and satisfies our unmetered request. |
| 2018 | // We then get LOSING when wifi validates and cell is outscored. |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2019 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 2020 | // TODO: Investigate sending validated before losing. |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2021 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 2022 | callback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2023 | defaultCallback.expectAvailableDoubleValidatedCallbacks(mWiFiNetworkAgent); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2024 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2025 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2026 | |
| 2027 | mEthernetNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2028 | callback.expectAvailableCallbacksUnvalidated(mEthernetNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 2029 | // TODO: Investigate sending validated before losing. |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2030 | callback.expectCallback(CallbackEntry.LOSING, mWiFiNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 2031 | callback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mEthernetNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2032 | defaultCallback.expectAvailableDoubleValidatedCallbacks(mEthernetNetworkAgent); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2033 | assertEquals(mEthernetNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2034 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2035 | |
| 2036 | mEthernetNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2037 | callback.expectCallback(CallbackEntry.LOST, mEthernetNetworkAgent); |
| 2038 | defaultCallback.expectCallback(CallbackEntry.LOST, mEthernetNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2039 | defaultCallback.expectAvailableCallbacksValidated(mWiFiNetworkAgent); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2040 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2041 | |
| 2042 | for (int i = 0; i < 4; i++) { |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2043 | TestNetworkAgentWrapper oldNetwork, newNetwork; |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2044 | if (i % 2 == 0) { |
| 2045 | mWiFiNetworkAgent.adjustScore(-15); |
| 2046 | oldNetwork = mWiFiNetworkAgent; |
| 2047 | newNetwork = mCellNetworkAgent; |
| 2048 | } else { |
| 2049 | mWiFiNetworkAgent.adjustScore(15); |
| 2050 | oldNetwork = mCellNetworkAgent; |
| 2051 | newNetwork = mWiFiNetworkAgent; |
| 2052 | |
| 2053 | } |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2054 | callback.expectCallback(CallbackEntry.LOSING, oldNetwork); |
Lorenzo Colitti | b57578ca | 2016-07-01 01:53:25 +0900 | [diff] [blame] | 2055 | // TODO: should we send an AVAILABLE callback to newNetwork, to indicate that it is no |
| 2056 | // longer lingering? |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2057 | defaultCallback.expectAvailableCallbacksValidated(newNetwork); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2058 | assertEquals(newNetwork.getNetwork(), mCm.getActiveNetwork()); |
| 2059 | } |
| 2060 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 2061 | |
| 2062 | // Verify that if a network no longer satisfies a request, we send LOST and not LOSING, even |
| 2063 | // if the network is still up. |
| 2064 | mWiFiNetworkAgent.removeCapability(NET_CAPABILITY_NOT_METERED); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 2065 | // We expect a notification about the capabilities change, and nothing else. |
| 2066 | defaultCallback.expectCapabilitiesWithout(NET_CAPABILITY_NOT_METERED, mWiFiNetworkAgent); |
| 2067 | defaultCallback.assertNoCallback(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2068 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2069 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2070 | |
| 2071 | // Wifi no longer satisfies our listen, which is for an unmetered network. |
| 2072 | // But because its score is 55, it's still up (and the default network). |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2073 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 2074 | |
| 2075 | // Disconnect our test networks. |
| 2076 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2077 | defaultCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2078 | defaultCallback.expectAvailableCallbacksValidated(mCellNetworkAgent); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2079 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2080 | mCellNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2081 | defaultCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2082 | waitForIdle(); |
| 2083 | assertEquals(null, mCm.getActiveNetwork()); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2084 | |
| 2085 | mCm.unregisterNetworkCallback(callback); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 2086 | waitForIdle(); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2087 | |
| 2088 | // Check that a network is only lingered or torn down if it would not satisfy a request even |
| 2089 | // if it validated. |
| 2090 | request = new NetworkRequest.Builder().clearCapabilities().build(); |
| 2091 | callback = new TestNetworkCallback(); |
| 2092 | |
| 2093 | mCm.registerNetworkCallback(request, callback); |
| 2094 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2095 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2096 | mCellNetworkAgent.connect(false); // Score: 10 |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2097 | callback.expectAvailableCallbacksUnvalidated(mCellNetworkAgent); |
| 2098 | defaultCallback.expectAvailableCallbacksUnvalidated(mCellNetworkAgent); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2099 | assertEquals(mCellNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2100 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2101 | |
| 2102 | // Bring up wifi with a score of 20. |
| 2103 | // Cell stays up because it would satisfy the default request if it validated. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2104 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2105 | mWiFiNetworkAgent.connect(false); // Score: 20 |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2106 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
| 2107 | defaultCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2108 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2109 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2110 | |
| 2111 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2112 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
| 2113 | defaultCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2114 | defaultCallback.expectAvailableCallbacksUnvalidated(mCellNetworkAgent); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2115 | assertEquals(mCellNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2116 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2117 | |
Chalard Jean | fb83076 | 2020-02-20 07:32:12 +0000 | [diff] [blame] | 2118 | // Bring up wifi with a score of 70. |
Lorenzo Colitti | 09e2021 | 2016-07-04 16:24:16 +0900 | [diff] [blame] | 2119 | // Cell is lingered because it would not satisfy any request, even if it validated. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2120 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Chalard Jean | fb83076 | 2020-02-20 07:32:12 +0000 | [diff] [blame] | 2121 | mWiFiNetworkAgent.adjustScore(50); |
| 2122 | mWiFiNetworkAgent.connect(false); // Score: 70 |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2123 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2124 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Chalard Jean | fb83076 | 2020-02-20 07:32:12 +0000 | [diff] [blame] | 2125 | defaultCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2126 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2127 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2128 | |
| 2129 | // Tear down wifi. |
| 2130 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2131 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
| 2132 | defaultCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2133 | defaultCallback.expectAvailableCallbacksUnvalidated(mCellNetworkAgent); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2134 | assertEquals(mCellNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2135 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2136 | |
Lorenzo Colitti | b57578ca | 2016-07-01 01:53:25 +0900 | [diff] [blame] | 2137 | // Bring up wifi, then validate it. Previous versions would immediately tear down cell, but |
| 2138 | // it's arguably correct to linger it, since it was the default network before it validated. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2139 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2140 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2141 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 2142 | // TODO: Investigate sending validated before losing. |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2143 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 2144 | callback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2145 | defaultCallback.expectAvailableThenValidatedCallbacks(mWiFiNetworkAgent); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2146 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2147 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2148 | |
| 2149 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2150 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
| 2151 | defaultCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2152 | defaultCallback.expectAvailableCallbacksUnvalidated(mCellNetworkAgent); |
Lorenzo Colitti | b57578ca | 2016-07-01 01:53:25 +0900 | [diff] [blame] | 2153 | mCellNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2154 | callback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
| 2155 | defaultCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2156 | waitForIdle(); |
| 2157 | assertEquals(null, mCm.getActiveNetwork()); |
Lorenzo Colitti | 09e2021 | 2016-07-04 16:24:16 +0900 | [diff] [blame] | 2158 | |
Lorenzo Colitti | b57578ca | 2016-07-01 01:53:25 +0900 | [diff] [blame] | 2159 | // If a network is lingering, and we add and remove a request from it, resume lingering. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2160 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Lorenzo Colitti | 09e2021 | 2016-07-04 16:24:16 +0900 | [diff] [blame] | 2161 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2162 | callback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
| 2163 | defaultCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2164 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2165 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | 09e2021 | 2016-07-04 16:24:16 +0900 | [diff] [blame] | 2166 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2167 | defaultCallback.expectAvailableDoubleValidatedCallbacks(mWiFiNetworkAgent); |
| 2168 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 2169 | // TODO: Investigate sending validated before losing. |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2170 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 2171 | callback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2172 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 09e2021 | 2016-07-04 16:24:16 +0900 | [diff] [blame] | 2173 | |
| 2174 | NetworkRequest cellRequest = new NetworkRequest.Builder() |
| 2175 | .addTransportType(TRANSPORT_CELLULAR).build(); |
| 2176 | NetworkCallback noopCallback = new NetworkCallback(); |
| 2177 | mCm.requestNetwork(cellRequest, noopCallback); |
Lorenzo Colitti | b57578ca | 2016-07-01 01:53:25 +0900 | [diff] [blame] | 2178 | // TODO: should this cause an AVAILABLE callback, to indicate that the network is no longer |
| 2179 | // lingering? |
Lorenzo Colitti | 09e2021 | 2016-07-04 16:24:16 +0900 | [diff] [blame] | 2180 | mCm.unregisterNetworkCallback(noopCallback); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2181 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Lorenzo Colitti | 09e2021 | 2016-07-04 16:24:16 +0900 | [diff] [blame] | 2182 | |
Lorenzo Colitti | b57578ca | 2016-07-01 01:53:25 +0900 | [diff] [blame] | 2183 | // Similar to the above: lingering can start even after the lingered request is removed. |
| 2184 | // Disconnect wifi and switch to cell. |
Lorenzo Colitti | 09e2021 | 2016-07-04 16:24:16 +0900 | [diff] [blame] | 2185 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2186 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
| 2187 | defaultCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2188 | defaultCallback.expectAvailableCallbacksValidated(mCellNetworkAgent); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2189 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | b57578ca | 2016-07-01 01:53:25 +0900 | [diff] [blame] | 2190 | |
| 2191 | // Cell is now the default network. Pin it with a cell-specific request. |
| 2192 | noopCallback = new NetworkCallback(); // Can't reuse NetworkCallbacks. http://b/20701525 |
| 2193 | mCm.requestNetwork(cellRequest, noopCallback); |
| 2194 | |
| 2195 | // Now connect wifi, and expect it to become the default network. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2196 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | b57578ca | 2016-07-01 01:53:25 +0900 | [diff] [blame] | 2197 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2198 | callback.expectAvailableThenValidatedCallbacks(mWiFiNetworkAgent); |
| 2199 | defaultCallback.expectAvailableDoubleValidatedCallbacks(mWiFiNetworkAgent); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2200 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | b57578ca | 2016-07-01 01:53:25 +0900 | [diff] [blame] | 2201 | // The default request is lingering on cell, but nothing happens to cell, and we send no |
| 2202 | // callbacks for it, because it's kept up by cellRequest. |
| 2203 | callback.assertNoCallback(); |
| 2204 | // Now unregister cellRequest and expect cell to start lingering. |
| 2205 | mCm.unregisterNetworkCallback(noopCallback); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2206 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Lorenzo Colitti | b57578ca | 2016-07-01 01:53:25 +0900 | [diff] [blame] | 2207 | |
| 2208 | // Let linger run its course. |
| 2209 | callback.assertNoCallback(); |
Remi NGUYEN VAN | 605f12d | 2018-07-11 18:17:06 +0900 | [diff] [blame] | 2210 | final int lingerTimeoutMs = mService.mLingerDelayMs + mService.mLingerDelayMs / 4; |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2211 | callback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent, lingerTimeoutMs); |
Lorenzo Colitti | b57578ca | 2016-07-01 01:53:25 +0900 | [diff] [blame] | 2212 | |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2213 | // Register a TRACK_DEFAULT request and check that it does not affect lingering. |
| 2214 | TestNetworkCallback trackDefaultCallback = new TestNetworkCallback(); |
| 2215 | mCm.registerDefaultNetworkCallback(trackDefaultCallback); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2216 | trackDefaultCallback.expectAvailableCallbacksValidated(mWiFiNetworkAgent); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2217 | mEthernetNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_ETHERNET); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2218 | mEthernetNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2219 | callback.expectAvailableCallbacksUnvalidated(mEthernetNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2220 | callback.expectCallback(CallbackEntry.LOSING, mWiFiNetworkAgent); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2221 | callback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mEthernetNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2222 | trackDefaultCallback.expectAvailableDoubleValidatedCallbacks(mEthernetNetworkAgent); |
| 2223 | defaultCallback.expectAvailableDoubleValidatedCallbacks(mEthernetNetworkAgent); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 2224 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2225 | |
| 2226 | // Let linger run its course. |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2227 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent, lingerTimeoutMs); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2228 | |
Lorenzo Colitti | b57578ca | 2016-07-01 01:53:25 +0900 | [diff] [blame] | 2229 | // Clean up. |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2230 | mEthernetNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2231 | callback.expectCallback(CallbackEntry.LOST, mEthernetNetworkAgent); |
| 2232 | defaultCallback.expectCallback(CallbackEntry.LOST, mEthernetNetworkAgent); |
| 2233 | trackDefaultCallback.expectCallback(CallbackEntry.LOST, mEthernetNetworkAgent); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2234 | |
| 2235 | mCm.unregisterNetworkCallback(callback); |
| 2236 | mCm.unregisterNetworkCallback(defaultCallback); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2237 | mCm.unregisterNetworkCallback(trackDefaultCallback); |
| 2238 | } |
| 2239 | |
paulhu | 86e23eb | 2019-11-05 18:05:05 +0800 | [diff] [blame] | 2240 | private void grantUsingBackgroundNetworksPermissionForUid(final int uid) throws Exception { |
| 2241 | final String testPackageName = mContext.getPackageName(); |
| 2242 | when(mPackageManager.getPackageInfo(eq(testPackageName), eq(GET_PERMISSIONS))) |
| 2243 | .thenReturn(buildPackageInfo(true, uid)); |
| 2244 | mService.mPermissionMonitor.onPackageAdded(testPackageName, uid); |
| 2245 | } |
| 2246 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 2247 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 2248 | public void testNetworkGoesIntoBackgroundAfterLinger() throws Exception { |
Leif Hendrik Wilden | fd30663 | 2018-05-02 12:05:24 -0700 | [diff] [blame] | 2249 | setAlwaysOnNetworks(true); |
paulhu | 86e23eb | 2019-11-05 18:05:05 +0800 | [diff] [blame] | 2250 | grantUsingBackgroundNetworksPermissionForUid(Binder.getCallingUid()); |
Chalard Jean | 1fa777d | 2018-02-16 16:07:53 +0900 | [diff] [blame] | 2251 | NetworkRequest request = new NetworkRequest.Builder() |
| 2252 | .clearCapabilities() |
| 2253 | .build(); |
| 2254 | TestNetworkCallback callback = new TestNetworkCallback(); |
| 2255 | mCm.registerNetworkCallback(request, callback); |
| 2256 | |
| 2257 | TestNetworkCallback defaultCallback = new TestNetworkCallback(); |
| 2258 | mCm.registerDefaultNetworkCallback(defaultCallback); |
| 2259 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2260 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
| 2261 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Chalard Jean | 1fa777d | 2018-02-16 16:07:53 +0900 | [diff] [blame] | 2262 | |
| 2263 | mCellNetworkAgent.connect(true); |
| 2264 | callback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
| 2265 | defaultCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
| 2266 | |
| 2267 | // Wifi comes up and cell lingers. |
| 2268 | mWiFiNetworkAgent.connect(true); |
| 2269 | defaultCallback.expectAvailableDoubleValidatedCallbacks(mWiFiNetworkAgent); |
| 2270 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2271 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Chalard Jean | 1fa777d | 2018-02-16 16:07:53 +0900 | [diff] [blame] | 2272 | callback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
| 2273 | |
| 2274 | // File a request for cellular, then release it. |
| 2275 | NetworkRequest cellRequest = new NetworkRequest.Builder() |
| 2276 | .addTransportType(TRANSPORT_CELLULAR).build(); |
| 2277 | NetworkCallback noopCallback = new NetworkCallback(); |
| 2278 | mCm.requestNetwork(cellRequest, noopCallback); |
| 2279 | mCm.unregisterNetworkCallback(noopCallback); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2280 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Chalard Jean | 1fa777d | 2018-02-16 16:07:53 +0900 | [diff] [blame] | 2281 | |
| 2282 | // Let linger run its course. |
Chalard Jean | b72b62d | 2018-02-16 16:08:35 +0900 | [diff] [blame] | 2283 | callback.assertNoCallback(); |
Chalard Jean | 1fa777d | 2018-02-16 16:07:53 +0900 | [diff] [blame] | 2284 | final int lingerTimeoutMs = TEST_LINGER_DELAY_MS + TEST_LINGER_DELAY_MS / 4; |
| 2285 | callback.expectCapabilitiesWithout(NET_CAPABILITY_FOREGROUND, mCellNetworkAgent, |
| 2286 | lingerTimeoutMs); |
| 2287 | |
| 2288 | // Clean up. |
| 2289 | mCm.unregisterNetworkCallback(defaultCallback); |
| 2290 | mCm.unregisterNetworkCallback(callback); |
| 2291 | } |
| 2292 | |
| 2293 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 2294 | public void testExplicitlySelected() throws Exception { |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2295 | NetworkRequest request = new NetworkRequest.Builder() |
| 2296 | .clearCapabilities().addCapability(NET_CAPABILITY_INTERNET) |
| 2297 | .build(); |
| 2298 | TestNetworkCallback callback = new TestNetworkCallback(); |
| 2299 | mCm.registerNetworkCallback(request, callback); |
| 2300 | |
| 2301 | // Bring up validated cell. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2302 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2303 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2304 | callback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2305 | |
| 2306 | // Bring up unvalidated wifi with explicitlySelected=true. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2307 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2308 | mWiFiNetworkAgent.explicitlySelected(true, false); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2309 | mWiFiNetworkAgent.connect(false); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2310 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2311 | |
| 2312 | // Cell Remains the default. |
| 2313 | assertEquals(mCellNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 2314 | |
| 2315 | // Lower wifi's score to below than cell, and check that it doesn't disconnect because |
| 2316 | // it's explicitly selected. |
| 2317 | mWiFiNetworkAgent.adjustScore(-40); |
| 2318 | mWiFiNetworkAgent.adjustScore(40); |
| 2319 | callback.assertNoCallback(); |
| 2320 | |
| 2321 | // If the user chooses yes on the "No Internet access, stay connected?" dialog, we switch to |
| 2322 | // wifi even though it's unvalidated. |
| 2323 | mCm.setAcceptUnvalidated(mWiFiNetworkAgent.getNetwork(), true, false); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2324 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2325 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 2326 | |
| 2327 | // Disconnect wifi, and then reconnect, again with explicitlySelected=true. |
| 2328 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2329 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2330 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2331 | mWiFiNetworkAgent.explicitlySelected(true, false); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2332 | mWiFiNetworkAgent.connect(false); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2333 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2334 | |
| 2335 | // If the user chooses no on the "No Internet access, stay connected?" dialog, we ask the |
| 2336 | // network to disconnect. |
| 2337 | mCm.setAcceptUnvalidated(mWiFiNetworkAgent.getNetwork(), false, false); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2338 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2339 | |
| 2340 | // Reconnect, again with explicitlySelected=true, but this time validate. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2341 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2342 | mWiFiNetworkAgent.explicitlySelected(true, false); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2343 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2344 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2345 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2346 | callback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
| 2347 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 2348 | |
| 2349 | // BUG: the network will no longer linger, even though it's validated and outscored. |
| 2350 | // TODO: fix this. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2351 | mEthernetNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_ETHERNET); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2352 | mEthernetNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2353 | callback.expectAvailableThenValidatedCallbacks(mEthernetNetworkAgent); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2354 | assertEquals(mEthernetNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 2355 | callback.assertNoCallback(); |
| 2356 | |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2357 | // Disconnect wifi, and then reconnect as if the user had selected "yes, don't ask again" |
| 2358 | // (i.e., with explicitlySelected=true and acceptUnvalidated=true). Expect to switch to |
| 2359 | // wifi immediately. |
| 2360 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2361 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2362 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2363 | mWiFiNetworkAgent.explicitlySelected(true, true); |
| 2364 | mWiFiNetworkAgent.connect(false); |
| 2365 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2366 | callback.expectCallback(CallbackEntry.LOSING, mEthernetNetworkAgent); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2367 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 2368 | mEthernetNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2369 | callback.expectCallback(CallbackEntry.LOST, mEthernetNetworkAgent); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2370 | |
| 2371 | // Disconnect and reconnect with explicitlySelected=false and acceptUnvalidated=true. |
| 2372 | // Check that the network is not scored specially and that the device prefers cell data. |
| 2373 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2374 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2375 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2376 | mWiFiNetworkAgent.explicitlySelected(false, true); |
| 2377 | mWiFiNetworkAgent.connect(false); |
| 2378 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
| 2379 | assertEquals(mCellNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 2380 | |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2381 | // Clean up. |
| 2382 | mWiFiNetworkAgent.disconnect(); |
| 2383 | mCellNetworkAgent.disconnect(); |
Lorenzo Colitti | 02cc839 | 2017-05-17 01:28:09 +0900 | [diff] [blame] | 2384 | |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2385 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
| 2386 | callback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
Lorenzo Colitti | 7369d8d1 | 2016-06-28 21:28:28 +0900 | [diff] [blame] | 2387 | } |
| 2388 | |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 2389 | private int[] makeIntArray(final int size, final int value) { |
| 2390 | final int[] array = new int[size]; |
| 2391 | Arrays.fill(array, value); |
| 2392 | return array; |
| 2393 | } |
| 2394 | |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2395 | private void tryNetworkFactoryRequests(int capability) throws Exception { |
Paul Jensen | 487ffe7 | 2015-07-24 15:57:11 -0400 | [diff] [blame] | 2396 | // Verify NOT_RESTRICTED is set appropriately |
| 2397 | final NetworkCapabilities nc = new NetworkRequest.Builder().addCapability(capability) |
| 2398 | .build().networkCapabilities; |
| 2399 | if (capability == NET_CAPABILITY_CBS || capability == NET_CAPABILITY_DUN || |
| 2400 | capability == NET_CAPABILITY_EIMS || capability == NET_CAPABILITY_FOTA || |
| 2401 | capability == NET_CAPABILITY_IA || capability == NET_CAPABILITY_IMS || |
Paul Jensen | aae613d | 2015-08-19 11:06:15 -0400 | [diff] [blame] | 2402 | capability == NET_CAPABILITY_RCS || capability == NET_CAPABILITY_XCAP) { |
Paul Jensen | 487ffe7 | 2015-07-24 15:57:11 -0400 | [diff] [blame] | 2403 | assertFalse(nc.hasCapability(NET_CAPABILITY_NOT_RESTRICTED)); |
| 2404 | } else { |
| 2405 | assertTrue(nc.hasCapability(NET_CAPABILITY_NOT_RESTRICTED)); |
| 2406 | } |
| 2407 | |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2408 | NetworkCapabilities filter = new NetworkCapabilities(); |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2409 | filter.addCapability(capability); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2410 | final HandlerThread handlerThread = new HandlerThread("testNetworkFactoryRequests"); |
| 2411 | handlerThread.start(); |
Paul Jensen | 0a2823e | 2015-06-12 10:31:09 -0400 | [diff] [blame] | 2412 | final MockNetworkFactory testFactory = new MockNetworkFactory(handlerThread.getLooper(), |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2413 | mServiceContext, "testFactory", filter); |
| 2414 | testFactory.setScoreFilter(40); |
Paul Jensen | 0a2823e | 2015-06-12 10:31:09 -0400 | [diff] [blame] | 2415 | ConditionVariable cv = testFactory.getNetworkStartedCV(); |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 2416 | testFactory.expectAddRequestsWithScores(0); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2417 | testFactory.register(); |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 2418 | testFactory.waitForNetworkRequests(1); |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2419 | int expectedRequestCount = 1; |
| 2420 | NetworkCallback networkCallback = null; |
| 2421 | // For non-INTERNET capabilities we cannot rely on the default request being present, so |
| 2422 | // add one. |
| 2423 | if (capability != NET_CAPABILITY_INTERNET) { |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2424 | assertFalse(testFactory.getMyStartRequested()); |
| 2425 | NetworkRequest request = new NetworkRequest.Builder().addCapability(capability).build(); |
| 2426 | networkCallback = new NetworkCallback(); |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 2427 | testFactory.expectAddRequestsWithScores(0); // New request |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2428 | mCm.requestNetwork(request, networkCallback); |
| 2429 | expectedRequestCount++; |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 2430 | testFactory.waitForNetworkRequests(expectedRequestCount); |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2431 | } |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 2432 | waitFor(cv); |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2433 | assertEquals(expectedRequestCount, testFactory.getMyRequestCount()); |
| 2434 | assertTrue(testFactory.getMyStartRequested()); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2435 | |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2436 | // Now bring in a higher scored network. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2437 | TestNetworkAgentWrapper testAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2438 | // Rather than create a validated network which complicates things by registering it's |
| 2439 | // own NetworkRequest during startup, just bump up the score to cancel out the |
| 2440 | // unvalidated penalty. |
| 2441 | testAgent.adjustScore(40); |
| 2442 | cv = testFactory.getNetworkStoppedCV(); |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 2443 | |
| 2444 | // When testAgent connects, ConnectivityService will re-send us all current requests with |
| 2445 | // the new score. There are expectedRequestCount such requests, and we must wait for all of |
| 2446 | // them. |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 2447 | testFactory.expectAddRequestsWithScores(makeIntArray(expectedRequestCount, 50)); |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2448 | testAgent.connect(false); |
| 2449 | testAgent.addCapability(capability); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 2450 | waitFor(cv); |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 2451 | testFactory.waitForNetworkRequests(expectedRequestCount); |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2452 | assertFalse(testFactory.getMyStartRequested()); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2453 | |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2454 | // Bring in a bunch of requests. |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 2455 | testFactory.expectAddRequestsWithScores(makeIntArray(10, 50)); |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 2456 | assertEquals(expectedRequestCount, testFactory.getMyRequestCount()); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2457 | ConnectivityManager.NetworkCallback[] networkCallbacks = |
| 2458 | new ConnectivityManager.NetworkCallback[10]; |
| 2459 | for (int i = 0; i< networkCallbacks.length; i++) { |
| 2460 | networkCallbacks[i] = new ConnectivityManager.NetworkCallback(); |
| 2461 | NetworkRequest.Builder builder = new NetworkRequest.Builder(); |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2462 | builder.addCapability(capability); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2463 | mCm.requestNetwork(builder.build(), networkCallbacks[i]); |
| 2464 | } |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2465 | testFactory.waitForNetworkRequests(10 + expectedRequestCount); |
| 2466 | assertFalse(testFactory.getMyStartRequested()); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2467 | |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2468 | // Remove the requests. |
Lorenzo Colitti | ffa390b | 2015-08-08 01:55:44 +0900 | [diff] [blame] | 2469 | testFactory.expectRemoveRequests(10); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2470 | for (int i = 0; i < networkCallbacks.length; i++) { |
| 2471 | mCm.unregisterNetworkCallback(networkCallbacks[i]); |
| 2472 | } |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2473 | testFactory.waitForNetworkRequests(expectedRequestCount); |
| 2474 | assertFalse(testFactory.getMyStartRequested()); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2475 | |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2476 | // Drop the higher scored network. |
| 2477 | cv = testFactory.getNetworkStartedCV(); |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 2478 | // With the default network disconnecting, the requests are sent with score 0 to factories. |
| 2479 | testFactory.expectAddRequestsWithScores(makeIntArray(expectedRequestCount, 0)); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2480 | testAgent.disconnect(); |
Paul Jensen | 3d91146 | 2015-06-12 06:40:24 -0400 | [diff] [blame] | 2481 | waitFor(cv); |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 2482 | testFactory.waitForNetworkRequests(expectedRequestCount); |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2483 | assertEquals(expectedRequestCount, testFactory.getMyRequestCount()); |
| 2484 | assertTrue(testFactory.getMyStartRequested()); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2485 | |
Lorenzo Colitti | f1080a9 | 2020-03-02 19:46:35 +0900 | [diff] [blame] | 2486 | testFactory.terminate(); |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2487 | if (networkCallback != null) mCm.unregisterNetworkCallback(networkCallback); |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2488 | handlerThread.quit(); |
| 2489 | } |
| 2490 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 2491 | @Test |
Paul Jensen | 85cf78e | 2015-06-25 13:25:07 -0400 | [diff] [blame] | 2492 | public void testNetworkFactoryRequests() throws Exception { |
| 2493 | tryNetworkFactoryRequests(NET_CAPABILITY_MMS); |
| 2494 | tryNetworkFactoryRequests(NET_CAPABILITY_SUPL); |
| 2495 | tryNetworkFactoryRequests(NET_CAPABILITY_DUN); |
| 2496 | tryNetworkFactoryRequests(NET_CAPABILITY_FOTA); |
| 2497 | tryNetworkFactoryRequests(NET_CAPABILITY_IMS); |
| 2498 | tryNetworkFactoryRequests(NET_CAPABILITY_CBS); |
| 2499 | tryNetworkFactoryRequests(NET_CAPABILITY_WIFI_P2P); |
| 2500 | tryNetworkFactoryRequests(NET_CAPABILITY_IA); |
| 2501 | tryNetworkFactoryRequests(NET_CAPABILITY_RCS); |
| 2502 | tryNetworkFactoryRequests(NET_CAPABILITY_XCAP); |
| 2503 | tryNetworkFactoryRequests(NET_CAPABILITY_EIMS); |
| 2504 | tryNetworkFactoryRequests(NET_CAPABILITY_NOT_METERED); |
| 2505 | tryNetworkFactoryRequests(NET_CAPABILITY_INTERNET); |
| 2506 | tryNetworkFactoryRequests(NET_CAPABILITY_TRUSTED); |
| 2507 | tryNetworkFactoryRequests(NET_CAPABILITY_NOT_VPN); |
| 2508 | // Skipping VALIDATED and CAPTIVE_PORTAL as they're disallowed. |
| 2509 | } |
| 2510 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 2511 | @Test |
Lorenzo Colitti | f1080a9 | 2020-03-02 19:46:35 +0900 | [diff] [blame] | 2512 | public void testNetworkFactoryUnregister() throws Exception { |
| 2513 | final NetworkCapabilities filter = new NetworkCapabilities(); |
| 2514 | filter.clearAll(); |
| 2515 | |
| 2516 | final HandlerThread handlerThread = new HandlerThread("testNetworkFactoryRequests"); |
| 2517 | handlerThread.start(); |
| 2518 | |
| 2519 | // Checks that calling setScoreFilter on a NetworkFactory immediately before closing it |
| 2520 | // does not crash. |
| 2521 | for (int i = 0; i < 100; i++) { |
| 2522 | final MockNetworkFactory testFactory = new MockNetworkFactory(handlerThread.getLooper(), |
| 2523 | mServiceContext, "testFactory", filter); |
| 2524 | // Register the factory and don't be surprised when the default request arrives. |
Lorenzo Colitti | f1080a9 | 2020-03-02 19:46:35 +0900 | [diff] [blame] | 2525 | testFactory.expectAddRequestsWithScores(0); |
Junyu Lai | 2762be9 | 2020-03-18 10:01:45 +0000 | [diff] [blame] | 2526 | testFactory.register(); |
Lorenzo Colitti | f1080a9 | 2020-03-02 19:46:35 +0900 | [diff] [blame] | 2527 | testFactory.waitForNetworkRequests(1); |
| 2528 | |
| 2529 | testFactory.setScoreFilter(42); |
| 2530 | testFactory.terminate(); |
| 2531 | |
| 2532 | if (i % 2 == 0) { |
| 2533 | try { |
| 2534 | testFactory.register(); |
| 2535 | fail("Re-registering terminated NetworkFactory should throw"); |
| 2536 | } catch (IllegalStateException expected) { |
| 2537 | } |
| 2538 | } |
| 2539 | } |
| 2540 | handlerThread.quit(); |
| 2541 | } |
| 2542 | |
| 2543 | @Test |
Paul Jensen | bb2e0e9 | 2015-06-16 15:11:58 -0400 | [diff] [blame] | 2544 | public void testNoMutableNetworkRequests() throws Exception { |
| 2545 | PendingIntent pendingIntent = PendingIntent.getBroadcast(mContext, 0, new Intent("a"), 0); |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 2546 | NetworkRequest request1 = new NetworkRequest.Builder() |
| 2547 | .addCapability(NET_CAPABILITY_VALIDATED) |
| 2548 | .build(); |
| 2549 | NetworkRequest request2 = new NetworkRequest.Builder() |
| 2550 | .addCapability(NET_CAPABILITY_CAPTIVE_PORTAL) |
| 2551 | .build(); |
| 2552 | |
| 2553 | Class<IllegalArgumentException> expected = IllegalArgumentException.class; |
Chalard Jean | 9c0ff1b | 2019-05-30 17:11:14 +0900 | [diff] [blame] | 2554 | assertThrows(expected, () -> mCm.requestNetwork(request1, new NetworkCallback())); |
| 2555 | assertThrows(expected, () -> mCm.requestNetwork(request1, pendingIntent)); |
| 2556 | assertThrows(expected, () -> mCm.requestNetwork(request2, new NetworkCallback())); |
| 2557 | assertThrows(expected, () -> mCm.requestNetwork(request2, pendingIntent)); |
Paul Jensen | bb2e0e9 | 2015-06-16 15:11:58 -0400 | [diff] [blame] | 2558 | } |
Robert Greenwalt | 348e98d | 2015-06-05 17:55:36 -0700 | [diff] [blame] | 2559 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 2560 | @Test |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2561 | public void testMMSonWiFi() throws Exception { |
| 2562 | // Test bringing up cellular without MMS NetworkRequest gets reaped |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2563 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2564 | mCellNetworkAgent.addCapability(NET_CAPABILITY_MMS); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2565 | mCellNetworkAgent.connectWithoutInternet(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2566 | mCellNetworkAgent.expectDisconnected(); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 2567 | waitForIdle(); |
Hugo Benichi | fed512a | 2017-06-26 10:06:49 +0900 | [diff] [blame] | 2568 | assertEmpty(mCm.getAllNetworks()); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2569 | verifyNoNetwork(); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 2570 | |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2571 | // Test bringing up validated WiFi. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2572 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 2573 | final ExpectedBroadcast b = expectConnectivityAction(TYPE_WIFI, DetailedState.CONNECTED); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2574 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 2575 | b.expectBroadcast(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2576 | verifyActiveNetwork(TRANSPORT_WIFI); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 2577 | |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2578 | // Register MMS NetworkRequest |
| 2579 | NetworkRequest.Builder builder = new NetworkRequest.Builder(); |
| 2580 | builder.addCapability(NetworkCapabilities.NET_CAPABILITY_MMS); |
| 2581 | final TestNetworkCallback networkCallback = new TestNetworkCallback(); |
| 2582 | mCm.requestNetwork(builder.build(), networkCallback); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 2583 | |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2584 | // Test bringing up unvalidated cellular with MMS |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2585 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2586 | mCellNetworkAgent.addCapability(NET_CAPABILITY_MMS); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2587 | mCellNetworkAgent.connectWithoutInternet(); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2588 | networkCallback.expectAvailableCallbacksUnvalidated(mCellNetworkAgent); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2589 | verifyActiveNetwork(TRANSPORT_WIFI); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 2590 | |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2591 | // Test releasing NetworkRequest disconnects cellular with MMS |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2592 | mCm.unregisterNetworkCallback(networkCallback); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2593 | mCellNetworkAgent.expectDisconnected(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2594 | verifyActiveNetwork(TRANSPORT_WIFI); |
| 2595 | } |
| 2596 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 2597 | @Test |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2598 | public void testMMSonCell() throws Exception { |
| 2599 | // Test bringing up cellular without MMS |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2600 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 2601 | ExpectedBroadcast b = expectConnectivityAction(TYPE_MOBILE, DetailedState.CONNECTED); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2602 | mCellNetworkAgent.connect(false); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 2603 | b.expectBroadcast(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2604 | verifyActiveNetwork(TRANSPORT_CELLULAR); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 2605 | |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2606 | // Register MMS NetworkRequest |
| 2607 | NetworkRequest.Builder builder = new NetworkRequest.Builder(); |
| 2608 | builder.addCapability(NetworkCapabilities.NET_CAPABILITY_MMS); |
| 2609 | final TestNetworkCallback networkCallback = new TestNetworkCallback(); |
| 2610 | mCm.requestNetwork(builder.build(), networkCallback); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 2611 | |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2612 | // Test bringing up MMS cellular network |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2613 | TestNetworkAgentWrapper |
| 2614 | mmsNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2615 | mmsNetworkAgent.addCapability(NET_CAPABILITY_MMS); |
| 2616 | mmsNetworkAgent.connectWithoutInternet(); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2617 | networkCallback.expectAvailableCallbacksUnvalidated(mmsNetworkAgent); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2618 | verifyActiveNetwork(TRANSPORT_CELLULAR); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 2619 | |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2620 | // Test releasing MMS NetworkRequest does not disconnect main cellular NetworkAgent |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2621 | mCm.unregisterNetworkCallback(networkCallback); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2622 | mmsNetworkAgent.expectDisconnected(); |
Paul Jensen | e098854 | 2015-06-25 15:30:08 -0400 | [diff] [blame] | 2623 | verifyActiveNetwork(TRANSPORT_CELLULAR); |
| 2624 | } |
| 2625 | |
lucaslin | f3b59b3 | 2019-03-26 17:49:49 +0800 | [diff] [blame] | 2626 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 2627 | public void testPartialConnectivity() throws Exception { |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2628 | // Register network callback. |
| 2629 | NetworkRequest request = new NetworkRequest.Builder() |
| 2630 | .clearCapabilities().addCapability(NET_CAPABILITY_INTERNET) |
| 2631 | .build(); |
| 2632 | TestNetworkCallback callback = new TestNetworkCallback(); |
| 2633 | mCm.registerNetworkCallback(request, callback); |
| 2634 | |
| 2635 | // Bring up validated mobile data. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2636 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2637 | mCellNetworkAgent.connect(true); |
| 2638 | callback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
| 2639 | |
| 2640 | // Bring up wifi with partial connectivity. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2641 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2642 | mWiFiNetworkAgent.connectWithPartialConnectivity(); |
| 2643 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
| 2644 | callback.expectCapabilitiesWith(NET_CAPABILITY_PARTIAL_CONNECTIVITY, mWiFiNetworkAgent); |
| 2645 | |
| 2646 | // Mobile data should be the default network. |
| 2647 | assertEquals(mCellNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 2648 | callback.assertNoCallback(); |
| 2649 | |
lucaslin | f3b59b3 | 2019-03-26 17:49:49 +0800 | [diff] [blame] | 2650 | // With HTTPS probe disabled, NetworkMonitor should pass the network validation with http |
| 2651 | // probe. |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 2652 | mWiFiNetworkAgent.setNetworkPartialValid(false /* isStrictMode */); |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2653 | // If the user chooses yes to use this partial connectivity wifi, switch the default |
| 2654 | // network to wifi and check if wifi becomes valid or not. |
| 2655 | mCm.setAcceptPartialConnectivity(mWiFiNetworkAgent.getNetwork(), true /* accept */, |
| 2656 | false /* always */); |
lucaslin | f3b59b3 | 2019-03-26 17:49:49 +0800 | [diff] [blame] | 2657 | // If user accepts partial connectivity network, |
| 2658 | // NetworkMonitor#setAcceptPartialConnectivity() should be called too. |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2659 | waitForIdle(); |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 2660 | verify(mWiFiNetworkAgent.mNetworkMonitor, times(1)).setAcceptPartialConnectivity(); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2661 | |
lucaslin | f3b59b3 | 2019-03-26 17:49:49 +0800 | [diff] [blame] | 2662 | // Need a trigger point to let NetworkMonitor tell ConnectivityService that network is |
| 2663 | // validated. |
| 2664 | mCm.reportNetworkConnectivity(mWiFiNetworkAgent.getNetwork(), true); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2665 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2666 | NetworkCapabilities nc = callback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, |
| 2667 | mWiFiNetworkAgent); |
| 2668 | assertTrue(nc.hasCapability(NET_CAPABILITY_PARTIAL_CONNECTIVITY)); |
| 2669 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 2670 | |
| 2671 | // Disconnect and reconnect wifi with partial connectivity again. |
| 2672 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2673 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2674 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2675 | mWiFiNetworkAgent.connectWithPartialConnectivity(); |
| 2676 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
| 2677 | callback.expectCapabilitiesWith(NET_CAPABILITY_PARTIAL_CONNECTIVITY, mWiFiNetworkAgent); |
| 2678 | |
| 2679 | // Mobile data should be the default network. |
| 2680 | assertEquals(mCellNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 2681 | |
| 2682 | // If the user chooses no, disconnect wifi immediately. |
| 2683 | mCm.setAcceptPartialConnectivity(mWiFiNetworkAgent.getNetwork(), false/* accept */, |
| 2684 | false /* always */); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2685 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2686 | |
| 2687 | // If user accepted partial connectivity before, and device reconnects to that network |
| 2688 | // again, but now the network has full connectivity. The network shouldn't contain |
| 2689 | // NET_CAPABILITY_PARTIAL_CONNECTIVITY. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2690 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2691 | // acceptUnvalidated is also used as setting for accepting partial networks. |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2692 | mWiFiNetworkAgent.explicitlySelected(true /* explicitlySelected */, |
| 2693 | true /* acceptUnvalidated */); |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2694 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2695 | |
lucaslin | f3b59b3 | 2019-03-26 17:49:49 +0800 | [diff] [blame] | 2696 | // If user accepted partial connectivity network before, |
| 2697 | // NetworkMonitor#setAcceptPartialConnectivity() will be called in |
| 2698 | // ConnectivityService#updateNetworkInfo(). |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2699 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
lucaslin | fe39f0a | 2019-09-04 18:14:22 +0800 | [diff] [blame] | 2700 | verify(mWiFiNetworkAgent.mNetworkMonitor, times(1)).setAcceptPartialConnectivity(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2701 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2702 | nc = callback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
| 2703 | assertFalse(nc.hasCapability(NET_CAPABILITY_PARTIAL_CONNECTIVITY)); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2704 | |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2705 | // Wifi should be the default network. |
| 2706 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 2707 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2708 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2709 | |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2710 | // The user accepted partial connectivity and selected "don't ask again". Now the user |
| 2711 | // reconnects to the partial connectivity network. Switch to wifi as soon as partial |
| 2712 | // connectivity is detected. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2713 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2714 | mWiFiNetworkAgent.explicitlySelected(true /* explicitlySelected */, |
| 2715 | true /* acceptUnvalidated */); |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2716 | mWiFiNetworkAgent.connectWithPartialConnectivity(); |
lucaslin | f3b59b3 | 2019-03-26 17:49:49 +0800 | [diff] [blame] | 2717 | // If user accepted partial connectivity network before, |
| 2718 | // NetworkMonitor#setAcceptPartialConnectivity() will be called in |
| 2719 | // ConnectivityService#updateNetworkInfo(). |
lucaslin | f3b59b3 | 2019-03-26 17:49:49 +0800 | [diff] [blame] | 2720 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
lucaslin | fe39f0a | 2019-09-04 18:14:22 +0800 | [diff] [blame] | 2721 | verify(mWiFiNetworkAgent.mNetworkMonitor, times(1)).setAcceptPartialConnectivity(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2722 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2723 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
lucaslin | f3b59b3 | 2019-03-26 17:49:49 +0800 | [diff] [blame] | 2724 | callback.expectCapabilitiesWith(NET_CAPABILITY_PARTIAL_CONNECTIVITY, mWiFiNetworkAgent); |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 2725 | mWiFiNetworkAgent.setNetworkValid(false /* isStrictMode */); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2726 | |
lucaslin | f3b59b3 | 2019-03-26 17:49:49 +0800 | [diff] [blame] | 2727 | // Need a trigger point to let NetworkMonitor tell ConnectivityService that network is |
| 2728 | // validated. |
| 2729 | mCm.reportNetworkConnectivity(mWiFiNetworkAgent.getNetwork(), true); |
| 2730 | callback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
| 2731 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2732 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2733 | |
| 2734 | // If the user accepted partial connectivity, and the device auto-reconnects to the partial |
| 2735 | // connectivity network, it should contain both PARTIAL_CONNECTIVITY and VALIDATED. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2736 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2737 | mWiFiNetworkAgent.explicitlySelected(false /* explicitlySelected */, |
| 2738 | true /* acceptUnvalidated */); |
| 2739 | |
| 2740 | // NetworkMonitor will immediately (once the HTTPS probe fails...) report the network as |
| 2741 | // valid, because ConnectivityService calls setAcceptPartialConnectivity before it calls |
| 2742 | // notifyNetworkConnected. |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 2743 | mWiFiNetworkAgent.connectWithPartialValidConnectivity(false /* isStrictMode */); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2744 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
lucaslin | fe39f0a | 2019-09-04 18:14:22 +0800 | [diff] [blame] | 2745 | verify(mWiFiNetworkAgent.mNetworkMonitor, times(1)).setAcceptPartialConnectivity(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2746 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Lorenzo Colitti | b5ad613 | 2019-06-04 22:15:33 +0900 | [diff] [blame] | 2747 | callback.expectCapabilitiesWith( |
| 2748 | NET_CAPABILITY_PARTIAL_CONNECTIVITY | NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
| 2749 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2750 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
lucaslin | e252a74 | 2019-03-12 13:08:03 +0800 | [diff] [blame] | 2751 | } |
| 2752 | |
| 2753 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 2754 | public void testCaptivePortalOnPartialConnectivity() throws Exception { |
Chiachang Wang | 8ea15c96 | 2019-05-23 16:29:30 +0800 | [diff] [blame] | 2755 | final TestNetworkCallback captivePortalCallback = new TestNetworkCallback(); |
| 2756 | final NetworkRequest captivePortalRequest = new NetworkRequest.Builder() |
| 2757 | .addCapability(NET_CAPABILITY_CAPTIVE_PORTAL).build(); |
| 2758 | mCm.registerNetworkCallback(captivePortalRequest, captivePortalCallback); |
| 2759 | |
| 2760 | final TestNetworkCallback validatedCallback = new TestNetworkCallback(); |
| 2761 | final NetworkRequest validatedRequest = new NetworkRequest.Builder() |
| 2762 | .addCapability(NET_CAPABILITY_VALIDATED).build(); |
| 2763 | mCm.registerNetworkCallback(validatedRequest, validatedCallback); |
| 2764 | |
| 2765 | // Bring up a network with a captive portal. |
| 2766 | // Expect onAvailable callback of listen for NET_CAPABILITY_CAPTIVE_PORTAL. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2767 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Chiachang Wang | f6d10b0 | 2019-05-24 11:20:47 +0800 | [diff] [blame] | 2768 | String redirectUrl = "http://android.com/path"; |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 2769 | mWiFiNetworkAgent.connectWithCaptivePortal(redirectUrl, false /* isStrictMode */); |
Chiachang Wang | 8ea15c96 | 2019-05-23 16:29:30 +0800 | [diff] [blame] | 2770 | captivePortalCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chiachang Wang | f6d10b0 | 2019-05-24 11:20:47 +0800 | [diff] [blame] | 2771 | assertEquals(mWiFiNetworkAgent.waitForRedirectUrl(), redirectUrl); |
Chiachang Wang | 8ea15c96 | 2019-05-23 16:29:30 +0800 | [diff] [blame] | 2772 | |
| 2773 | // Check that startCaptivePortalApp sends the expected command to NetworkMonitor. |
| 2774 | mCm.startCaptivePortalApp(mWiFiNetworkAgent.getNetwork()); |
| 2775 | verify(mWiFiNetworkAgent.mNetworkMonitor, timeout(TIMEOUT_MS).times(1)) |
| 2776 | .launchCaptivePortalApp(); |
| 2777 | |
| 2778 | // Report that the captive portal is dismissed with partial connectivity, and check that |
| 2779 | // callbacks are fired. |
| 2780 | mWiFiNetworkAgent.setNetworkPartial(); |
Chiachang Wang | f6d10b0 | 2019-05-24 11:20:47 +0800 | [diff] [blame] | 2781 | mCm.reportNetworkConnectivity(mWiFiNetworkAgent.getNetwork(), true); |
Chiachang Wang | 8ea15c96 | 2019-05-23 16:29:30 +0800 | [diff] [blame] | 2782 | waitForIdle(); |
| 2783 | captivePortalCallback.expectCapabilitiesWith(NET_CAPABILITY_PARTIAL_CONNECTIVITY, |
| 2784 | mWiFiNetworkAgent); |
| 2785 | |
| 2786 | // Report partial connectivity is accepted. |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 2787 | mWiFiNetworkAgent.setNetworkPartialValid(false /* isStrictMode */); |
Chiachang Wang | 8ea15c96 | 2019-05-23 16:29:30 +0800 | [diff] [blame] | 2788 | mCm.setAcceptPartialConnectivity(mWiFiNetworkAgent.getNetwork(), true /* accept */, |
| 2789 | false /* always */); |
| 2790 | waitForIdle(); |
| 2791 | mCm.reportNetworkConnectivity(mWiFiNetworkAgent.getNetwork(), true); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2792 | captivePortalCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Chiachang Wang | 8ea15c96 | 2019-05-23 16:29:30 +0800 | [diff] [blame] | 2793 | validatedCallback.expectAvailableCallbacksValidated(mWiFiNetworkAgent); |
| 2794 | NetworkCapabilities nc = |
| 2795 | validatedCallback.expectCapabilitiesWith(NET_CAPABILITY_PARTIAL_CONNECTIVITY, |
| 2796 | mWiFiNetworkAgent); |
| 2797 | |
| 2798 | mCm.unregisterNetworkCallback(captivePortalCallback); |
| 2799 | mCm.unregisterNetworkCallback(validatedCallback); |
| 2800 | } |
| 2801 | |
| 2802 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 2803 | public void testCaptivePortal() throws Exception { |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 2804 | final TestNetworkCallback captivePortalCallback = new TestNetworkCallback(); |
| 2805 | final NetworkRequest captivePortalRequest = new NetworkRequest.Builder() |
| 2806 | .addCapability(NET_CAPABILITY_CAPTIVE_PORTAL).build(); |
| 2807 | mCm.registerNetworkCallback(captivePortalRequest, captivePortalCallback); |
| 2808 | |
| 2809 | final TestNetworkCallback validatedCallback = new TestNetworkCallback(); |
| 2810 | final NetworkRequest validatedRequest = new NetworkRequest.Builder() |
| 2811 | .addCapability(NET_CAPABILITY_VALIDATED).build(); |
| 2812 | mCm.registerNetworkCallback(validatedRequest, validatedCallback); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 2813 | |
| 2814 | // Bring up a network with a captive portal. |
| 2815 | // Expect onAvailable callback of listen for NET_CAPABILITY_CAPTIVE_PORTAL. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2816 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Paul Jensen | 23243731 | 2016-04-06 09:51:26 -0400 | [diff] [blame] | 2817 | String firstRedirectUrl = "http://example.com/firstPath"; |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 2818 | mWiFiNetworkAgent.connectWithCaptivePortal(firstRedirectUrl, false /* isStrictMode */); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2819 | captivePortalCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Paul Jensen | 23243731 | 2016-04-06 09:51:26 -0400 | [diff] [blame] | 2820 | assertEquals(mWiFiNetworkAgent.waitForRedirectUrl(), firstRedirectUrl); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 2821 | |
| 2822 | // Take down network. |
| 2823 | // Expect onLost callback. |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 2824 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2825 | captivePortalCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 2826 | |
| 2827 | // Bring up a network with a captive portal. |
| 2828 | // Expect onAvailable callback of listen for NET_CAPABILITY_CAPTIVE_PORTAL. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2829 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Paul Jensen | 23243731 | 2016-04-06 09:51:26 -0400 | [diff] [blame] | 2830 | String secondRedirectUrl = "http://example.com/secondPath"; |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 2831 | mWiFiNetworkAgent.connectWithCaptivePortal(secondRedirectUrl, false /* isStrictMode */); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2832 | captivePortalCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Paul Jensen | 23243731 | 2016-04-06 09:51:26 -0400 | [diff] [blame] | 2833 | assertEquals(mWiFiNetworkAgent.waitForRedirectUrl(), secondRedirectUrl); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 2834 | |
| 2835 | // Make captive portal disappear then revalidate. |
| 2836 | // Expect onLost callback because network no longer provides NET_CAPABILITY_CAPTIVE_PORTAL. |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 2837 | mWiFiNetworkAgent.setNetworkValid(false /* isStrictMode */); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 2838 | mCm.reportNetworkConnectivity(mWiFiNetworkAgent.getNetwork(), true); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2839 | captivePortalCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 2840 | |
| 2841 | // Expect NET_CAPABILITY_VALIDATED onAvailable callback. |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2842 | validatedCallback.expectAvailableDoubleValidatedCallbacks(mWiFiNetworkAgent); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 2843 | |
| 2844 | // Break network connectivity. |
| 2845 | // Expect NET_CAPABILITY_VALIDATED onLost callback. |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 2846 | mWiFiNetworkAgent.setNetworkInvalid(false /* isStrictMode */); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 2847 | mCm.reportNetworkConnectivity(mWiFiNetworkAgent.getNetwork(), false); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2848 | validatedCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Paul Jensen | cf4c2c6 | 2015-07-01 14:16:32 -0400 | [diff] [blame] | 2849 | } |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 2850 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 2851 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 2852 | public void testCaptivePortalApp() throws Exception { |
Lorenzo Colitti | 4734cdb | 2017-04-27 14:30:21 +0900 | [diff] [blame] | 2853 | final TestNetworkCallback captivePortalCallback = new TestNetworkCallback(); |
| 2854 | final NetworkRequest captivePortalRequest = new NetworkRequest.Builder() |
| 2855 | .addCapability(NET_CAPABILITY_CAPTIVE_PORTAL).build(); |
| 2856 | mCm.registerNetworkCallback(captivePortalRequest, captivePortalCallback); |
| 2857 | |
| 2858 | final TestNetworkCallback validatedCallback = new TestNetworkCallback(); |
| 2859 | final NetworkRequest validatedRequest = new NetworkRequest.Builder() |
| 2860 | .addCapability(NET_CAPABILITY_VALIDATED).build(); |
| 2861 | mCm.registerNetworkCallback(validatedRequest, validatedCallback); |
| 2862 | |
| 2863 | // Bring up wifi. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2864 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | 4734cdb | 2017-04-27 14:30:21 +0900 | [diff] [blame] | 2865 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2866 | validatedCallback.expectAvailableDoubleValidatedCallbacks(mWiFiNetworkAgent); |
Lorenzo Colitti | 4734cdb | 2017-04-27 14:30:21 +0900 | [diff] [blame] | 2867 | Network wifiNetwork = mWiFiNetworkAgent.getNetwork(); |
| 2868 | |
| 2869 | // Check that calling startCaptivePortalApp does nothing. |
| 2870 | final int fastTimeoutMs = 100; |
| 2871 | mCm.startCaptivePortalApp(wifiNetwork); |
Remi NGUYEN VAN | 0839a19 | 2019-06-17 11:28:27 +0900 | [diff] [blame] | 2872 | waitForIdle(); |
| 2873 | verify(mWiFiNetworkAgent.mNetworkMonitor, never()).launchCaptivePortalApp(); |
Lorenzo Colitti | 4734cdb | 2017-04-27 14:30:21 +0900 | [diff] [blame] | 2874 | mServiceContext.expectNoStartActivityIntent(fastTimeoutMs); |
| 2875 | |
| 2876 | // Turn into a captive portal. |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 2877 | mWiFiNetworkAgent.setNetworkPortal("http://example.com", false /* isStrictMode */); |
Lorenzo Colitti | 4734cdb | 2017-04-27 14:30:21 +0900 | [diff] [blame] | 2878 | mCm.reportNetworkConnectivity(wifiNetwork, false); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2879 | captivePortalCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2880 | validatedCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 4734cdb | 2017-04-27 14:30:21 +0900 | [diff] [blame] | 2881 | |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 2882 | // Check that startCaptivePortalApp sends the expected command to NetworkMonitor. |
Lorenzo Colitti | 4734cdb | 2017-04-27 14:30:21 +0900 | [diff] [blame] | 2883 | mCm.startCaptivePortalApp(wifiNetwork); |
Remi NGUYEN VAN | 0839a19 | 2019-06-17 11:28:27 +0900 | [diff] [blame] | 2884 | waitForIdle(); |
| 2885 | verify(mWiFiNetworkAgent.mNetworkMonitor).launchCaptivePortalApp(); |
| 2886 | |
| 2887 | // NetworkMonitor uses startCaptivePortal(Network, Bundle) (startCaptivePortalAppInternal) |
| 2888 | final Bundle testBundle = new Bundle(); |
| 2889 | final String testKey = "testkey"; |
| 2890 | final String testValue = "testvalue"; |
| 2891 | testBundle.putString(testKey, testValue); |
Remi NGUYEN VAN | ead1ef4 | 2019-12-17 16:45:42 +0900 | [diff] [blame] | 2892 | mServiceContext.setPermission(NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK, |
| 2893 | PERMISSION_GRANTED); |
Remi NGUYEN VAN | 0839a19 | 2019-06-17 11:28:27 +0900 | [diff] [blame] | 2894 | mCm.startCaptivePortalApp(wifiNetwork, testBundle); |
| 2895 | final Intent signInIntent = mServiceContext.expectStartActivityIntent(TIMEOUT_MS); |
| 2896 | assertEquals(ACTION_CAPTIVE_PORTAL_SIGN_IN, signInIntent.getAction()); |
| 2897 | assertEquals(testValue, signInIntent.getStringExtra(testKey)); |
Lorenzo Colitti | 4734cdb | 2017-04-27 14:30:21 +0900 | [diff] [blame] | 2898 | |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 2899 | // Report that the captive portal is dismissed, and check that callbacks are fired |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 2900 | mWiFiNetworkAgent.setNetworkValid(false /* isStrictMode */); |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 2901 | mWiFiNetworkAgent.mNetworkMonitor.forceReevaluation(Process.myUid()); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 2902 | validatedCallback.expectAvailableCallbacksValidated(mWiFiNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 2903 | captivePortalCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 4734cdb | 2017-04-27 14:30:21 +0900 | [diff] [blame] | 2904 | |
| 2905 | mCm.unregisterNetworkCallback(validatedCallback); |
| 2906 | mCm.unregisterNetworkCallback(captivePortalCallback); |
| 2907 | } |
| 2908 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 2909 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 2910 | public void testAvoidOrIgnoreCaptivePortals() throws Exception { |
Calvin On | 1f64f3f | 2016-10-11 15:10:46 -0700 | [diff] [blame] | 2911 | final TestNetworkCallback captivePortalCallback = new TestNetworkCallback(); |
| 2912 | final NetworkRequest captivePortalRequest = new NetworkRequest.Builder() |
| 2913 | .addCapability(NET_CAPABILITY_CAPTIVE_PORTAL).build(); |
| 2914 | mCm.registerNetworkCallback(captivePortalRequest, captivePortalCallback); |
| 2915 | |
| 2916 | final TestNetworkCallback validatedCallback = new TestNetworkCallback(); |
| 2917 | final NetworkRequest validatedRequest = new NetworkRequest.Builder() |
| 2918 | .addCapability(NET_CAPABILITY_VALIDATED).build(); |
| 2919 | mCm.registerNetworkCallback(validatedRequest, validatedCallback); |
| 2920 | |
| 2921 | setCaptivePortalMode(Settings.Global.CAPTIVE_PORTAL_MODE_AVOID); |
| 2922 | // Bring up a network with a captive portal. |
| 2923 | // Expect it to fail to connect and not result in any callbacks. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2924 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Calvin On | 1f64f3f | 2016-10-11 15:10:46 -0700 | [diff] [blame] | 2925 | String firstRedirectUrl = "http://example.com/firstPath"; |
| 2926 | |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 2927 | mWiFiNetworkAgent.connectWithCaptivePortal(firstRedirectUrl, false /* isStrictMode */); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 2928 | mWiFiNetworkAgent.expectDisconnected(); |
| 2929 | mWiFiNetworkAgent.expectPreventReconnectReceived(); |
Calvin On | 1f64f3f | 2016-10-11 15:10:46 -0700 | [diff] [blame] | 2930 | |
| 2931 | assertNoCallbacks(captivePortalCallback, validatedCallback); |
Calvin On | 1f64f3f | 2016-10-11 15:10:46 -0700 | [diff] [blame] | 2932 | } |
| 2933 | |
Remi NGUYEN VAN | 91aa5bc | 2019-12-12 12:57:11 +0900 | [diff] [blame] | 2934 | @Test |
| 2935 | public void testCaptivePortalApi() throws Exception { |
| 2936 | mServiceContext.setPermission( |
| 2937 | android.Manifest.permission.NETWORK_SETTINGS, PERMISSION_GRANTED); |
| 2938 | |
| 2939 | final TestNetworkCallback captivePortalCallback = new TestNetworkCallback(); |
| 2940 | final NetworkRequest captivePortalRequest = new NetworkRequest.Builder() |
| 2941 | .addCapability(NET_CAPABILITY_CAPTIVE_PORTAL).build(); |
| 2942 | mCm.registerNetworkCallback(captivePortalRequest, captivePortalCallback); |
| 2943 | |
| 2944 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
| 2945 | final String redirectUrl = "http://example.com/firstPath"; |
| 2946 | |
| 2947 | mWiFiNetworkAgent.connectWithCaptivePortal(redirectUrl, false /* isStrictMode */); |
| 2948 | captivePortalCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
| 2949 | |
| 2950 | final CaptivePortalData testData = new CaptivePortalData.Builder() |
| 2951 | .setUserPortalUrl(Uri.parse(redirectUrl)) |
| 2952 | .setBytesRemaining(12345L) |
| 2953 | .build(); |
| 2954 | |
| 2955 | mWiFiNetworkAgent.notifyCaptivePortalDataChanged(testData); |
| 2956 | |
| 2957 | captivePortalCallback.expectLinkPropertiesThat(mWiFiNetworkAgent, |
| 2958 | lp -> testData.equals(lp.getCaptivePortalData())); |
| 2959 | |
| 2960 | final LinkProperties newLps = new LinkProperties(); |
| 2961 | newLps.setMtu(1234); |
| 2962 | mWiFiNetworkAgent.sendLinkProperties(newLps); |
| 2963 | // CaptivePortalData is not lost and unchanged when LPs are received from the NetworkAgent |
| 2964 | captivePortalCallback.expectLinkPropertiesThat(mWiFiNetworkAgent, |
| 2965 | lp -> testData.equals(lp.getCaptivePortalData()) && lp.getMtu() == 1234); |
| 2966 | } |
| 2967 | |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 2968 | private NetworkRequest.Builder newWifiRequestBuilder() { |
| 2969 | return new NetworkRequest.Builder().addTransportType(TRANSPORT_WIFI); |
| 2970 | } |
| 2971 | |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 2972 | /** |
| 2973 | * Verify request matching behavior with network specifiers. |
| 2974 | * |
| 2975 | * Note: this test is somewhat problematic since it involves removing capabilities from |
| 2976 | * agents - i.e. agents rejecting requests which they previously accepted. This is flagged |
| 2977 | * as a WTF bug in |
| 2978 | * {@link ConnectivityService#mixInCapabilities(NetworkAgentInfo, NetworkCapabilities)} but |
| 2979 | * does work. |
| 2980 | */ |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 2981 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 2982 | public void testNetworkSpecifier() throws Exception { |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 2983 | // A NetworkSpecifier subclass that matches all networks but must not be visible to apps. |
| 2984 | class ConfidentialMatchAllNetworkSpecifier extends NetworkSpecifier implements |
| 2985 | Parcelable { |
| 2986 | @Override |
Chalard Jean | 2da4f9f | 2020-03-27 17:57:34 +0900 | [diff] [blame] | 2987 | public boolean canBeSatisfiedBy(NetworkSpecifier other) { |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 2988 | return true; |
| 2989 | } |
| 2990 | |
| 2991 | @Override |
| 2992 | public int describeContents() { |
| 2993 | return 0; |
| 2994 | } |
| 2995 | |
| 2996 | @Override |
| 2997 | public void writeToParcel(Parcel dest, int flags) {} |
| 2998 | |
| 2999 | @Override |
| 3000 | public NetworkSpecifier redact() { |
| 3001 | return null; |
| 3002 | } |
| 3003 | } |
| 3004 | |
| 3005 | // A network specifier that matches either another LocalNetworkSpecifier with the same |
| 3006 | // string or a ConfidentialMatchAllNetworkSpecifier, and can be passed to apps as is. |
| 3007 | class LocalStringNetworkSpecifier extends NetworkSpecifier implements Parcelable { |
| 3008 | private String mString; |
| 3009 | |
| 3010 | LocalStringNetworkSpecifier(String string) { |
| 3011 | mString = string; |
| 3012 | } |
| 3013 | |
| 3014 | @Override |
Chalard Jean | 2da4f9f | 2020-03-27 17:57:34 +0900 | [diff] [blame] | 3015 | public boolean canBeSatisfiedBy(NetworkSpecifier other) { |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 3016 | if (other instanceof LocalStringNetworkSpecifier) { |
| 3017 | return TextUtils.equals(mString, |
| 3018 | ((LocalStringNetworkSpecifier) other).mString); |
| 3019 | } |
| 3020 | if (other instanceof ConfidentialMatchAllNetworkSpecifier) return true; |
| 3021 | return false; |
| 3022 | } |
| 3023 | |
| 3024 | @Override |
| 3025 | public int describeContents() { |
| 3026 | return 0; |
| 3027 | } |
| 3028 | @Override |
| 3029 | public void writeToParcel(Parcel dest, int flags) {} |
| 3030 | } |
| 3031 | |
| 3032 | |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3033 | NetworkRequest rEmpty1 = newWifiRequestBuilder().build(); |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 3034 | NetworkRequest rEmpty2 = newWifiRequestBuilder().setNetworkSpecifier((String) null).build(); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3035 | NetworkRequest rEmpty3 = newWifiRequestBuilder().setNetworkSpecifier("").build(); |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 3036 | NetworkRequest rEmpty4 = newWifiRequestBuilder().setNetworkSpecifier( |
| 3037 | (NetworkSpecifier) null).build(); |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 3038 | NetworkRequest rFoo = newWifiRequestBuilder().setNetworkSpecifier( |
| 3039 | new LocalStringNetworkSpecifier("foo")).build(); |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 3040 | NetworkRequest rBar = newWifiRequestBuilder().setNetworkSpecifier( |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 3041 | new LocalStringNetworkSpecifier("bar")).build(); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3042 | |
| 3043 | TestNetworkCallback cEmpty1 = new TestNetworkCallback(); |
| 3044 | TestNetworkCallback cEmpty2 = new TestNetworkCallback(); |
| 3045 | TestNetworkCallback cEmpty3 = new TestNetworkCallback(); |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 3046 | TestNetworkCallback cEmpty4 = new TestNetworkCallback(); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3047 | TestNetworkCallback cFoo = new TestNetworkCallback(); |
| 3048 | TestNetworkCallback cBar = new TestNetworkCallback(); |
| 3049 | TestNetworkCallback[] emptyCallbacks = new TestNetworkCallback[] { |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 3050 | cEmpty1, cEmpty2, cEmpty3, cEmpty4 }; |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3051 | |
| 3052 | mCm.registerNetworkCallback(rEmpty1, cEmpty1); |
| 3053 | mCm.registerNetworkCallback(rEmpty2, cEmpty2); |
| 3054 | mCm.registerNetworkCallback(rEmpty3, cEmpty3); |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 3055 | mCm.registerNetworkCallback(rEmpty4, cEmpty4); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3056 | mCm.registerNetworkCallback(rFoo, cFoo); |
| 3057 | mCm.registerNetworkCallback(rBar, cBar); |
| 3058 | |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 3059 | LocalStringNetworkSpecifier nsFoo = new LocalStringNetworkSpecifier("foo"); |
| 3060 | LocalStringNetworkSpecifier nsBar = new LocalStringNetworkSpecifier("bar"); |
| 3061 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3062 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3063 | mWiFiNetworkAgent.connect(false); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3064 | cEmpty1.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
| 3065 | cEmpty2.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
| 3066 | cEmpty3.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
| 3067 | cEmpty4.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3068 | assertNoCallbacks(cFoo, cBar); |
| 3069 | |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 3070 | mWiFiNetworkAgent.setNetworkSpecifier(nsFoo); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3071 | cFoo.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3072 | for (TestNetworkCallback c: emptyCallbacks) { |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 3073 | c.expectCapabilitiesThat(mWiFiNetworkAgent, |
| 3074 | (caps) -> caps.getNetworkSpecifier().equals(nsFoo)); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3075 | } |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 3076 | cFoo.expectCapabilitiesThat(mWiFiNetworkAgent, |
| 3077 | (caps) -> caps.getNetworkSpecifier().equals(nsFoo)); |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 3078 | assertEquals(nsFoo, |
| 3079 | mCm.getNetworkCapabilities(mWiFiNetworkAgent.getNetwork()).getNetworkSpecifier()); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3080 | cFoo.assertNoCallback(); |
| 3081 | |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 3082 | mWiFiNetworkAgent.setNetworkSpecifier(nsBar); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3083 | cFoo.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3084 | cBar.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3085 | for (TestNetworkCallback c: emptyCallbacks) { |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 3086 | c.expectCapabilitiesThat(mWiFiNetworkAgent, |
| 3087 | (caps) -> caps.getNetworkSpecifier().equals(nsBar)); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3088 | } |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 3089 | cBar.expectCapabilitiesThat(mWiFiNetworkAgent, |
| 3090 | (caps) -> caps.getNetworkSpecifier().equals(nsBar)); |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 3091 | assertEquals(nsBar, |
| 3092 | mCm.getNetworkCapabilities(mWiFiNetworkAgent.getNetwork()).getNetworkSpecifier()); |
| 3093 | cBar.assertNoCallback(); |
| 3094 | |
| 3095 | mWiFiNetworkAgent.setNetworkSpecifier(new ConfidentialMatchAllNetworkSpecifier()); |
| 3096 | cFoo.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
| 3097 | for (TestNetworkCallback c : emptyCallbacks) { |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 3098 | c.expectCapabilitiesThat(mWiFiNetworkAgent, |
| 3099 | (caps) -> caps.getNetworkSpecifier() == null); |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 3100 | } |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 3101 | cFoo.expectCapabilitiesThat(mWiFiNetworkAgent, |
| 3102 | (caps) -> caps.getNetworkSpecifier() == null); |
| 3103 | cBar.expectCapabilitiesThat(mWiFiNetworkAgent, |
| 3104 | (caps) -> caps.getNetworkSpecifier() == null); |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 3105 | assertNull( |
| 3106 | mCm.getNetworkCapabilities(mWiFiNetworkAgent.getNetwork()).getNetworkSpecifier()); |
| 3107 | cFoo.assertNoCallback(); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3108 | cBar.assertNoCallback(); |
| 3109 | |
| 3110 | mWiFiNetworkAgent.setNetworkSpecifier(null); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3111 | cFoo.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
| 3112 | cBar.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3113 | for (TestNetworkCallback c: emptyCallbacks) { |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3114 | c.expectCallback(CallbackEntry.NETWORK_CAPS_UPDATED, mWiFiNetworkAgent); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3115 | } |
| 3116 | |
Etan Cohen | 836ad57 | 2018-12-30 17:59:59 -0800 | [diff] [blame] | 3117 | assertNoCallbacks(cEmpty1, cEmpty2, cEmpty3, cEmpty4, cFoo, cBar); |
Lorenzo Colitti | 6556a22 | 2017-04-03 17:46:35 +0900 | [diff] [blame] | 3118 | } |
| 3119 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 3120 | @Test |
Etan Cohen | ddb9ef0 | 2015-11-18 10:56:15 -0800 | [diff] [blame] | 3121 | public void testInvalidNetworkSpecifier() { |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3122 | assertThrows(IllegalArgumentException.class, () -> { |
Etan Cohen | ddb9ef0 | 2015-11-18 10:56:15 -0800 | [diff] [blame] | 3123 | NetworkRequest.Builder builder = new NetworkRequest.Builder(); |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 3124 | builder.setNetworkSpecifier(new MatchAllNetworkSpecifier()); |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3125 | }); |
Etan Cohen | ddb9ef0 | 2015-11-18 10:56:15 -0800 | [diff] [blame] | 3126 | |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3127 | assertThrows(IllegalArgumentException.class, () -> { |
Etan Cohen | ddb9ef0 | 2015-11-18 10:56:15 -0800 | [diff] [blame] | 3128 | NetworkCapabilities networkCapabilities = new NetworkCapabilities(); |
| 3129 | networkCapabilities.addTransportType(TRANSPORT_WIFI) |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 3130 | .setNetworkSpecifier(new MatchAllNetworkSpecifier()); |
Etan Cohen | ddb9ef0 | 2015-11-18 10:56:15 -0800 | [diff] [blame] | 3131 | mService.requestNetwork(networkCapabilities, null, 0, null, |
Qingxi Li | 9c5d8b9 | 2020-01-08 12:51:49 -0800 | [diff] [blame] | 3132 | ConnectivityManager.TYPE_WIFI, mContext.getPackageName()); |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3133 | }); |
Etan Cohen | ddb9ef0 | 2015-11-18 10:56:15 -0800 | [diff] [blame] | 3134 | |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 3135 | class NonParcelableSpecifier extends NetworkSpecifier { |
Chalard Jean | 2da4f9f | 2020-03-27 17:57:34 +0900 | [diff] [blame] | 3136 | @Override |
| 3137 | public boolean canBeSatisfiedBy(NetworkSpecifier other) { |
| 3138 | return false; |
| 3139 | } |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 3140 | }; |
| 3141 | class ParcelableSpecifier extends NonParcelableSpecifier implements Parcelable { |
| 3142 | @Override public int describeContents() { return 0; } |
| 3143 | @Override public void writeToParcel(Parcel p, int flags) {} |
| 3144 | } |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 3145 | |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3146 | final NetworkRequest.Builder builder = |
| 3147 | new NetworkRequest.Builder().addTransportType(TRANSPORT_ETHERNET); |
| 3148 | assertThrows(ClassCastException.class, () -> { |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 3149 | builder.setNetworkSpecifier(new NonParcelableSpecifier()); |
| 3150 | Parcel parcelW = Parcel.obtain(); |
| 3151 | builder.build().writeToParcel(parcelW, 0); |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3152 | }); |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 3153 | |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3154 | final NetworkRequest nr = |
| 3155 | new NetworkRequest.Builder().addTransportType(TRANSPORT_ETHERNET) |
| 3156 | .setNetworkSpecifier(new ParcelableSpecifier()) |
| 3157 | .build(); |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 3158 | assertNotNull(nr); |
| 3159 | |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3160 | assertThrows(BadParcelableException.class, () -> { |
Etan Cohen | a743427 | 2017-04-03 12:17:51 -0700 | [diff] [blame] | 3161 | Parcel parcelW = Parcel.obtain(); |
| 3162 | nr.writeToParcel(parcelW, 0); |
| 3163 | byte[] bytes = parcelW.marshall(); |
| 3164 | parcelW.recycle(); |
| 3165 | |
| 3166 | Parcel parcelR = Parcel.obtain(); |
| 3167 | parcelR.unmarshall(bytes, 0, bytes.length); |
| 3168 | parcelR.setDataPosition(0); |
| 3169 | NetworkRequest rereadNr = NetworkRequest.CREATOR.createFromParcel(parcelR); |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3170 | }); |
Etan Cohen | ddb9ef0 | 2015-11-18 10:56:15 -0800 | [diff] [blame] | 3171 | } |
| 3172 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 3173 | @Test |
Roshan Pius | e38acab | 2020-01-16 12:17:17 -0800 | [diff] [blame] | 3174 | public void testNetworkRequestUidSpoofSecurityException() throws Exception { |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3175 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Etan Cohen | 859748f | 2017-04-03 17:42:34 -0700 | [diff] [blame] | 3176 | mWiFiNetworkAgent.connect(false); |
Roshan Pius | e38acab | 2020-01-16 12:17:17 -0800 | [diff] [blame] | 3177 | NetworkRequest networkRequest = newWifiRequestBuilder().build(); |
Etan Cohen | 859748f | 2017-04-03 17:42:34 -0700 | [diff] [blame] | 3178 | TestNetworkCallback networkCallback = new TestNetworkCallback(); |
Roshan Pius | e38acab | 2020-01-16 12:17:17 -0800 | [diff] [blame] | 3179 | doThrow(new SecurityException()).when(mAppOpsManager).checkPackage(anyInt(), anyString()); |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3180 | assertThrows(SecurityException.class, () -> { |
Etan Cohen | 859748f | 2017-04-03 17:42:34 -0700 | [diff] [blame] | 3181 | mCm.requestNetwork(networkRequest, networkCallback); |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3182 | }); |
Etan Cohen | 859748f | 2017-04-03 17:42:34 -0700 | [diff] [blame] | 3183 | } |
| 3184 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 3185 | @Test |
paulhu | 3d67f53 | 2019-03-22 16:35:06 +0800 | [diff] [blame] | 3186 | public void testInvalidSignalStrength() { |
| 3187 | NetworkRequest r = new NetworkRequest.Builder() |
| 3188 | .addCapability(NET_CAPABILITY_INTERNET) |
| 3189 | .addTransportType(TRANSPORT_WIFI) |
| 3190 | .setSignalStrength(-75) |
| 3191 | .build(); |
| 3192 | // Registering a NetworkCallback with signal strength but w/o NETWORK_SIGNAL_STRENGTH_WAKEUP |
| 3193 | // permission should get SecurityException. |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3194 | assertThrows(SecurityException.class, () -> |
| 3195 | mCm.registerNetworkCallback(r, new NetworkCallback())); |
paulhu | 3d67f53 | 2019-03-22 16:35:06 +0800 | [diff] [blame] | 3196 | |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3197 | assertThrows(SecurityException.class, () -> |
| 3198 | mCm.registerNetworkCallback(r, PendingIntent.getService( |
| 3199 | mServiceContext, 0, new Intent(), 0))); |
paulhu | 3d67f53 | 2019-03-22 16:35:06 +0800 | [diff] [blame] | 3200 | |
| 3201 | // Requesting a Network with signal strength should get IllegalArgumentException. |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3202 | assertThrows(IllegalArgumentException.class, () -> |
| 3203 | mCm.requestNetwork(r, new NetworkCallback())); |
paulhu | 3d67f53 | 2019-03-22 16:35:06 +0800 | [diff] [blame] | 3204 | |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 3205 | assertThrows(IllegalArgumentException.class, () -> |
| 3206 | mCm.requestNetwork(r, PendingIntent.getService( |
| 3207 | mServiceContext, 0, new Intent(), 0))); |
paulhu | 3d67f53 | 2019-03-22 16:35:06 +0800 | [diff] [blame] | 3208 | } |
| 3209 | |
| 3210 | @Test |
Erik Kline | a2d2940 | 2016-03-16 15:31:39 +0900 | [diff] [blame] | 3211 | public void testRegisterDefaultNetworkCallback() throws Exception { |
| 3212 | final TestNetworkCallback defaultNetworkCallback = new TestNetworkCallback(); |
| 3213 | mCm.registerDefaultNetworkCallback(defaultNetworkCallback); |
| 3214 | defaultNetworkCallback.assertNoCallback(); |
| 3215 | |
| 3216 | // Create a TRANSPORT_CELLULAR request to keep the mobile interface up |
| 3217 | // whenever Wi-Fi is up. Without this, the mobile network agent is |
| 3218 | // reaped before any other activity can take place. |
| 3219 | final TestNetworkCallback cellNetworkCallback = new TestNetworkCallback(); |
| 3220 | final NetworkRequest cellRequest = new NetworkRequest.Builder() |
| 3221 | .addTransportType(TRANSPORT_CELLULAR).build(); |
| 3222 | mCm.requestNetwork(cellRequest, cellNetworkCallback); |
| 3223 | cellNetworkCallback.assertNoCallback(); |
| 3224 | |
| 3225 | // Bring up cell and expect CALLBACK_AVAILABLE. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3226 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Erik Kline | a2d2940 | 2016-03-16 15:31:39 +0900 | [diff] [blame] | 3227 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3228 | cellNetworkCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
| 3229 | defaultNetworkCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 3230 | assertEquals(defaultNetworkCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Erik Kline | a2d2940 | 2016-03-16 15:31:39 +0900 | [diff] [blame] | 3231 | |
| 3232 | // Bring up wifi and expect CALLBACK_AVAILABLE. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3233 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Erik Kline | a2d2940 | 2016-03-16 15:31:39 +0900 | [diff] [blame] | 3234 | mWiFiNetworkAgent.connect(true); |
| 3235 | cellNetworkCallback.assertNoCallback(); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3236 | defaultNetworkCallback.expectAvailableDoubleValidatedCallbacks(mWiFiNetworkAgent); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 3237 | assertEquals(defaultNetworkCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Erik Kline | a2d2940 | 2016-03-16 15:31:39 +0900 | [diff] [blame] | 3238 | |
| 3239 | // Bring down cell. Expect no default network callback, since it wasn't the default. |
| 3240 | mCellNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3241 | cellNetworkCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
Erik Kline | a2d2940 | 2016-03-16 15:31:39 +0900 | [diff] [blame] | 3242 | defaultNetworkCallback.assertNoCallback(); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 3243 | assertEquals(defaultNetworkCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Erik Kline | a2d2940 | 2016-03-16 15:31:39 +0900 | [diff] [blame] | 3244 | |
| 3245 | // Bring up cell. Expect no default network callback, since it won't be the default. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3246 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Erik Kline | a2d2940 | 2016-03-16 15:31:39 +0900 | [diff] [blame] | 3247 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3248 | cellNetworkCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
Erik Kline | a2d2940 | 2016-03-16 15:31:39 +0900 | [diff] [blame] | 3249 | defaultNetworkCallback.assertNoCallback(); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 3250 | assertEquals(defaultNetworkCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Erik Kline | a2d2940 | 2016-03-16 15:31:39 +0900 | [diff] [blame] | 3251 | |
| 3252 | // Bring down wifi. Expect the default network callback to notified of LOST wifi |
| 3253 | // followed by AVAILABLE cell. |
| 3254 | mWiFiNetworkAgent.disconnect(); |
| 3255 | cellNetworkCallback.assertNoCallback(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3256 | defaultNetworkCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3257 | defaultNetworkCallback.expectAvailableCallbacksValidated(mCellNetworkAgent); |
Erik Kline | a2d2940 | 2016-03-16 15:31:39 +0900 | [diff] [blame] | 3258 | mCellNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3259 | cellNetworkCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
| 3260 | defaultNetworkCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 3261 | waitForIdle(); |
| 3262 | assertEquals(null, mCm.getActiveNetwork()); |
| 3263 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 3264 | mMockVpn.establishForMyUid(); |
| 3265 | defaultNetworkCallback.expectAvailableThenValidatedCallbacks(mMockVpn); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 3266 | assertEquals(defaultNetworkCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
| 3267 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 3268 | mMockVpn.disconnect(); |
| 3269 | defaultNetworkCallback.expectCallback(CallbackEntry.LOST, mMockVpn); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 3270 | waitForIdle(); |
| 3271 | assertEquals(null, mCm.getActiveNetwork()); |
Erik Kline | a2d2940 | 2016-03-16 15:31:39 +0900 | [diff] [blame] | 3272 | } |
| 3273 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 3274 | @Test |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3275 | public void testAdditionalStateCallbacks() throws Exception { |
Erik Kline | acdd639 | 2016-07-07 16:50:58 +0900 | [diff] [blame] | 3276 | // File a network request for mobile. |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3277 | final TestNetworkCallback cellNetworkCallback = new TestNetworkCallback(); |
Erik Kline | acdd639 | 2016-07-07 16:50:58 +0900 | [diff] [blame] | 3278 | final NetworkRequest cellRequest = new NetworkRequest.Builder() |
| 3279 | .addTransportType(TRANSPORT_CELLULAR).build(); |
| 3280 | mCm.requestNetwork(cellRequest, cellNetworkCallback); |
| 3281 | |
| 3282 | // Bring up the mobile network. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3283 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Erik Kline | acdd639 | 2016-07-07 16:50:58 +0900 | [diff] [blame] | 3284 | mCellNetworkAgent.connect(true); |
| 3285 | |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3286 | // We should get onAvailable(), onCapabilitiesChanged(), and |
| 3287 | // onLinkPropertiesChanged() in rapid succession. Additionally, we |
| 3288 | // should get onCapabilitiesChanged() when the mobile network validates. |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3289 | cellNetworkCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
Erik Kline | acdd639 | 2016-07-07 16:50:58 +0900 | [diff] [blame] | 3290 | cellNetworkCallback.assertNoCallback(); |
| 3291 | |
| 3292 | // Update LinkProperties. |
| 3293 | final LinkProperties lp = new LinkProperties(); |
| 3294 | lp.setInterfaceName("foonet_data0"); |
| 3295 | mCellNetworkAgent.sendLinkProperties(lp); |
| 3296 | // We should get onLinkPropertiesChanged(). |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3297 | cellNetworkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 3298 | mCellNetworkAgent); |
Erik Kline | acdd639 | 2016-07-07 16:50:58 +0900 | [diff] [blame] | 3299 | cellNetworkCallback.assertNoCallback(); |
| 3300 | |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3301 | // Suspend the network. |
| 3302 | mCellNetworkAgent.suspend(); |
Chalard Jean | 804b8fb | 2018-01-30 22:41:41 +0900 | [diff] [blame] | 3303 | cellNetworkCallback.expectCapabilitiesWithout(NET_CAPABILITY_NOT_SUSPENDED, |
| 3304 | mCellNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3305 | cellNetworkCallback.expectCallback(CallbackEntry.SUSPENDED, mCellNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3306 | cellNetworkCallback.assertNoCallback(); |
Chiachang Wang | a5d8fe8 | 2020-02-12 17:01:59 +0800 | [diff] [blame] | 3307 | assertEquals(NetworkInfo.State.SUSPENDED, mCm.getActiveNetworkInfo().getState()); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3308 | |
Erik Kline | acdd639 | 2016-07-07 16:50:58 +0900 | [diff] [blame] | 3309 | // Register a garden variety default network request. |
Chalard Jean | 804b8fb | 2018-01-30 22:41:41 +0900 | [diff] [blame] | 3310 | TestNetworkCallback dfltNetworkCallback = new TestNetworkCallback(); |
Erik Kline | acdd639 | 2016-07-07 16:50:58 +0900 | [diff] [blame] | 3311 | mCm.registerDefaultNetworkCallback(dfltNetworkCallback); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3312 | // We should get onAvailable(), onCapabilitiesChanged(), onLinkPropertiesChanged(), |
| 3313 | // as well as onNetworkSuspended() in rapid succession. |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3314 | dfltNetworkCallback.expectAvailableAndSuspendedCallbacks(mCellNetworkAgent, true); |
Erik Kline | acdd639 | 2016-07-07 16:50:58 +0900 | [diff] [blame] | 3315 | dfltNetworkCallback.assertNoCallback(); |
Chalard Jean | 804b8fb | 2018-01-30 22:41:41 +0900 | [diff] [blame] | 3316 | mCm.unregisterNetworkCallback(dfltNetworkCallback); |
| 3317 | |
| 3318 | mCellNetworkAgent.resume(); |
| 3319 | cellNetworkCallback.expectCapabilitiesWith(NET_CAPABILITY_NOT_SUSPENDED, |
| 3320 | mCellNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3321 | cellNetworkCallback.expectCallback(CallbackEntry.RESUMED, mCellNetworkAgent); |
Chalard Jean | 804b8fb | 2018-01-30 22:41:41 +0900 | [diff] [blame] | 3322 | cellNetworkCallback.assertNoCallback(); |
Chiachang Wang | a5d8fe8 | 2020-02-12 17:01:59 +0800 | [diff] [blame] | 3323 | assertEquals(NetworkInfo.State.CONNECTED, mCm.getActiveNetworkInfo().getState()); |
Chalard Jean | 804b8fb | 2018-01-30 22:41:41 +0900 | [diff] [blame] | 3324 | |
| 3325 | dfltNetworkCallback = new TestNetworkCallback(); |
| 3326 | mCm.registerDefaultNetworkCallback(dfltNetworkCallback); |
| 3327 | // This time onNetworkSuspended should not be called. |
| 3328 | dfltNetworkCallback.expectAvailableCallbacksValidated(mCellNetworkAgent); |
| 3329 | dfltNetworkCallback.assertNoCallback(); |
Erik Kline | acdd639 | 2016-07-07 16:50:58 +0900 | [diff] [blame] | 3330 | |
Erik Kline | acdd639 | 2016-07-07 16:50:58 +0900 | [diff] [blame] | 3331 | mCm.unregisterNetworkCallback(dfltNetworkCallback); |
| 3332 | mCm.unregisterNetworkCallback(cellNetworkCallback); |
| 3333 | } |
| 3334 | |
Calvin On | 1f64f3f | 2016-10-11 15:10:46 -0700 | [diff] [blame] | 3335 | private void setCaptivePortalMode(int mode) { |
| 3336 | ContentResolver cr = mServiceContext.getContentResolver(); |
| 3337 | Settings.Global.putInt(cr, Settings.Global.CAPTIVE_PORTAL_MODE, mode); |
| 3338 | } |
| 3339 | |
Leif Hendrik Wilden | fd30663 | 2018-05-02 12:05:24 -0700 | [diff] [blame] | 3340 | private void setAlwaysOnNetworks(boolean enable) { |
Lorenzo Colitti | e14d49a | 2016-07-20 21:35:19 +0900 | [diff] [blame] | 3341 | ContentResolver cr = mServiceContext.getContentResolver(); |
| 3342 | Settings.Global.putInt(cr, Settings.Global.MOBILE_DATA_ALWAYS_ON, enable ? 1 : 0); |
Leif Hendrik Wilden | fd30663 | 2018-05-02 12:05:24 -0700 | [diff] [blame] | 3343 | mService.updateAlwaysOnNetworks(); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 3344 | waitForIdle(); |
Lorenzo Colitti | e14d49a | 2016-07-20 21:35:19 +0900 | [diff] [blame] | 3345 | } |
| 3346 | |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 3347 | private void setPrivateDnsSettings(String mode, String specifier) { |
| 3348 | final ContentResolver cr = mServiceContext.getContentResolver(); |
| 3349 | Settings.Global.putString(cr, Settings.Global.PRIVATE_DNS_MODE, mode); |
| 3350 | Settings.Global.putString(cr, Settings.Global.PRIVATE_DNS_SPECIFIER, specifier); |
| 3351 | mService.updatePrivateDnsSettings(); |
| 3352 | waitForIdle(); |
| 3353 | } |
| 3354 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3355 | private boolean isForegroundNetwork(TestNetworkAgentWrapper network) { |
Lorenzo Colitti | e14d49a | 2016-07-20 21:35:19 +0900 | [diff] [blame] | 3356 | NetworkCapabilities nc = mCm.getNetworkCapabilities(network.getNetwork()); |
| 3357 | assertNotNull(nc); |
| 3358 | return nc.hasCapability(NET_CAPABILITY_FOREGROUND); |
| 3359 | } |
| 3360 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 3361 | @Test |
Lorenzo Colitti | e14d49a | 2016-07-20 21:35:19 +0900 | [diff] [blame] | 3362 | public void testBackgroundNetworks() throws Exception { |
| 3363 | // Create a background request. We can't do this ourselves because ConnectivityService |
| 3364 | // doesn't have an API for it. So just turn on mobile data always on. |
Leif Hendrik Wilden | fd30663 | 2018-05-02 12:05:24 -0700 | [diff] [blame] | 3365 | setAlwaysOnNetworks(true); |
paulhu | 86e23eb | 2019-11-05 18:05:05 +0800 | [diff] [blame] | 3366 | grantUsingBackgroundNetworksPermissionForUid(Binder.getCallingUid()); |
Lorenzo Colitti | e14d49a | 2016-07-20 21:35:19 +0900 | [diff] [blame] | 3367 | final NetworkRequest request = new NetworkRequest.Builder().build(); |
| 3368 | final NetworkRequest fgRequest = new NetworkRequest.Builder() |
| 3369 | .addCapability(NET_CAPABILITY_FOREGROUND).build(); |
| 3370 | final TestNetworkCallback callback = new TestNetworkCallback(); |
| 3371 | final TestNetworkCallback fgCallback = new TestNetworkCallback(); |
| 3372 | mCm.registerNetworkCallback(request, callback); |
| 3373 | mCm.registerNetworkCallback(fgRequest, fgCallback); |
| 3374 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3375 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Lorenzo Colitti | e14d49a | 2016-07-20 21:35:19 +0900 | [diff] [blame] | 3376 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3377 | callback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
| 3378 | fgCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
Lorenzo Colitti | e14d49a | 2016-07-20 21:35:19 +0900 | [diff] [blame] | 3379 | assertTrue(isForegroundNetwork(mCellNetworkAgent)); |
| 3380 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3381 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | e14d49a | 2016-07-20 21:35:19 +0900 | [diff] [blame] | 3382 | mWiFiNetworkAgent.connect(true); |
| 3383 | |
| 3384 | // When wifi connects, cell lingers. |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3385 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3386 | callback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3387 | callback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3388 | fgCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3389 | fgCallback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3390 | fgCallback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
Lorenzo Colitti | e14d49a | 2016-07-20 21:35:19 +0900 | [diff] [blame] | 3391 | assertTrue(isForegroundNetwork(mCellNetworkAgent)); |
| 3392 | assertTrue(isForegroundNetwork(mWiFiNetworkAgent)); |
| 3393 | |
| 3394 | // When lingering is complete, cell is still there but is now in the background. |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 3395 | waitForIdle(); |
Hugo Benichi | dfb559a | 2016-12-20 14:57:49 +0900 | [diff] [blame] | 3396 | int timeoutMs = TEST_LINGER_DELAY_MS + TEST_LINGER_DELAY_MS / 4; |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3397 | fgCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent, timeoutMs); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3398 | // Expect a network capabilities update sans FOREGROUND. |
| 3399 | callback.expectCapabilitiesWithout(NET_CAPABILITY_FOREGROUND, mCellNetworkAgent); |
Lorenzo Colitti | e14d49a | 2016-07-20 21:35:19 +0900 | [diff] [blame] | 3400 | assertFalse(isForegroundNetwork(mCellNetworkAgent)); |
| 3401 | assertTrue(isForegroundNetwork(mWiFiNetworkAgent)); |
| 3402 | |
| 3403 | // File a cell request and check that cell comes into the foreground. |
| 3404 | final NetworkRequest cellRequest = new NetworkRequest.Builder() |
| 3405 | .addTransportType(TRANSPORT_CELLULAR).build(); |
| 3406 | final TestNetworkCallback cellCallback = new TestNetworkCallback(); |
| 3407 | mCm.requestNetwork(cellRequest, cellCallback); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3408 | cellCallback.expectAvailableCallbacksValidated(mCellNetworkAgent); |
| 3409 | fgCallback.expectAvailableCallbacksValidated(mCellNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3410 | // Expect a network capabilities update with FOREGROUND, because the most recent |
| 3411 | // request causes its state to change. |
Chalard Jean | 28e6b26 | 2019-11-19 21:30:44 +0900 | [diff] [blame] | 3412 | cellCallback.expectCapabilitiesWith(NET_CAPABILITY_FOREGROUND, mCellNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3413 | callback.expectCapabilitiesWith(NET_CAPABILITY_FOREGROUND, mCellNetworkAgent); |
Lorenzo Colitti | e14d49a | 2016-07-20 21:35:19 +0900 | [diff] [blame] | 3414 | assertTrue(isForegroundNetwork(mCellNetworkAgent)); |
| 3415 | assertTrue(isForegroundNetwork(mWiFiNetworkAgent)); |
| 3416 | |
| 3417 | // Release the request. The network immediately goes into the background, since it was not |
| 3418 | // lingering. |
| 3419 | mCm.unregisterNetworkCallback(cellCallback); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3420 | fgCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3421 | // Expect a network capabilities update sans FOREGROUND. |
| 3422 | callback.expectCapabilitiesWithout(NET_CAPABILITY_FOREGROUND, mCellNetworkAgent); |
Lorenzo Colitti | e14d49a | 2016-07-20 21:35:19 +0900 | [diff] [blame] | 3423 | assertFalse(isForegroundNetwork(mCellNetworkAgent)); |
| 3424 | assertTrue(isForegroundNetwork(mWiFiNetworkAgent)); |
| 3425 | |
| 3426 | // Disconnect wifi and check that cell is foreground again. |
| 3427 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3428 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
| 3429 | fgCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3430 | fgCallback.expectAvailableCallbacksValidated(mCellNetworkAgent); |
Lorenzo Colitti | e14d49a | 2016-07-20 21:35:19 +0900 | [diff] [blame] | 3431 | assertTrue(isForegroundNetwork(mCellNetworkAgent)); |
| 3432 | |
| 3433 | mCm.unregisterNetworkCallback(callback); |
| 3434 | mCm.unregisterNetworkCallback(fgCallback); |
| 3435 | } |
| 3436 | |
Hugo Benichi | 849b81b | 2017-05-25 13:42:31 +0900 | [diff] [blame] | 3437 | @Ignore // This test has instrinsic chances of spurious failures: ignore for continuous testing. |
Hugo Benichi | 02f8f9c | 2017-05-29 13:13:52 +0900 | [diff] [blame] | 3438 | public void benchmarkRequestRegistrationAndCallbackDispatch() throws Exception { |
Hugo Benichi | cbf8ff8 | 2016-11-15 11:25:52 +0900 | [diff] [blame] | 3439 | // TODO: turn this unit test into a real benchmarking test. |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 3440 | // Benchmarks connecting and switching performance in the presence of a large number of |
| 3441 | // NetworkRequests. |
| 3442 | // 1. File NUM_REQUESTS requests. |
| 3443 | // 2. Have a network connect. Wait for NUM_REQUESTS onAvailable callbacks to fire. |
| 3444 | // 3. Have a new network connect and outscore the previous. Wait for NUM_REQUESTS onLosing |
| 3445 | // and NUM_REQUESTS onAvailable callbacks to fire. |
| 3446 | // See how long it took. |
| 3447 | final int NUM_REQUESTS = 90; |
Hugo Benichi | 02f8f9c | 2017-05-29 13:13:52 +0900 | [diff] [blame] | 3448 | final int REGISTER_TIME_LIMIT_MS = 200; |
| 3449 | final int CONNECT_TIME_LIMIT_MS = 60; |
| 3450 | final int SWITCH_TIME_LIMIT_MS = 60; |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 3451 | final int UNREGISTER_TIME_LIMIT_MS = 20; |
| 3452 | |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 3453 | final NetworkRequest request = new NetworkRequest.Builder().clearCapabilities().build(); |
| 3454 | final NetworkCallback[] callbacks = new NetworkCallback[NUM_REQUESTS]; |
| 3455 | final CountDownLatch availableLatch = new CountDownLatch(NUM_REQUESTS); |
| 3456 | final CountDownLatch losingLatch = new CountDownLatch(NUM_REQUESTS); |
| 3457 | |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 3458 | for (int i = 0; i < NUM_REQUESTS; i++) { |
| 3459 | callbacks[i] = new NetworkCallback() { |
| 3460 | @Override public void onAvailable(Network n) { availableLatch.countDown(); } |
| 3461 | @Override public void onLosing(Network n, int t) { losingLatch.countDown(); } |
| 3462 | }; |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 3463 | } |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 3464 | |
Chalard Jean | 9c0ff1b | 2019-05-30 17:11:14 +0900 | [diff] [blame] | 3465 | assertRunsInAtMost("Registering callbacks", REGISTER_TIME_LIMIT_MS, () -> { |
Hugo Benichi | cbf8ff8 | 2016-11-15 11:25:52 +0900 | [diff] [blame] | 3466 | for (NetworkCallback cb : callbacks) { |
| 3467 | mCm.registerNetworkCallback(request, cb); |
| 3468 | } |
| 3469 | }); |
| 3470 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3471 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 3472 | // Don't request that the network validate, because otherwise connect() will block until |
| 3473 | // the network gets NET_CAPABILITY_VALIDATED, after all the callbacks below have fired, |
| 3474 | // and we won't actually measure anything. |
| 3475 | mCellNetworkAgent.connect(false); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 3476 | |
Hugo Benichi | cbf8ff8 | 2016-11-15 11:25:52 +0900 | [diff] [blame] | 3477 | long onAvailableDispatchingDuration = durationOf(() -> { |
Chalard Jean | 9c0ff1b | 2019-05-30 17:11:14 +0900 | [diff] [blame] | 3478 | await(availableLatch, 10 * CONNECT_TIME_LIMIT_MS); |
Hugo Benichi | cbf8ff8 | 2016-11-15 11:25:52 +0900 | [diff] [blame] | 3479 | }); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 3480 | Log.d(TAG, String.format("Dispatched %d of %d onAvailable callbacks in %dms", |
| 3481 | NUM_REQUESTS - availableLatch.getCount(), NUM_REQUESTS, |
| 3482 | onAvailableDispatchingDuration)); |
| 3483 | assertTrue(String.format("Dispatching %d onAvailable callbacks in %dms, expected %dms", |
| 3484 | NUM_REQUESTS, onAvailableDispatchingDuration, CONNECT_TIME_LIMIT_MS), |
| 3485 | onAvailableDispatchingDuration <= CONNECT_TIME_LIMIT_MS); |
Hugo Benichi | cbf8ff8 | 2016-11-15 11:25:52 +0900 | [diff] [blame] | 3486 | |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 3487 | // Give wifi a high enough score that we'll linger cell when wifi comes up. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3488 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 3489 | mWiFiNetworkAgent.adjustScore(40); |
| 3490 | mWiFiNetworkAgent.connect(false); |
Hugo Benichi | cbf8ff8 | 2016-11-15 11:25:52 +0900 | [diff] [blame] | 3491 | |
| 3492 | long onLostDispatchingDuration = durationOf(() -> { |
Chalard Jean | 9c0ff1b | 2019-05-30 17:11:14 +0900 | [diff] [blame] | 3493 | await(losingLatch, 10 * SWITCH_TIME_LIMIT_MS); |
Hugo Benichi | cbf8ff8 | 2016-11-15 11:25:52 +0900 | [diff] [blame] | 3494 | }); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 3495 | Log.d(TAG, String.format("Dispatched %d of %d onLosing callbacks in %dms", |
| 3496 | NUM_REQUESTS - losingLatch.getCount(), NUM_REQUESTS, onLostDispatchingDuration)); |
| 3497 | assertTrue(String.format("Dispatching %d onLosing callbacks in %dms, expected %dms", |
| 3498 | NUM_REQUESTS, onLostDispatchingDuration, SWITCH_TIME_LIMIT_MS), |
| 3499 | onLostDispatchingDuration <= SWITCH_TIME_LIMIT_MS); |
Lorenzo Colitti | 6ee0a92 | 2016-06-27 16:44:07 +0900 | [diff] [blame] | 3500 | |
Chalard Jean | 9c0ff1b | 2019-05-30 17:11:14 +0900 | [diff] [blame] | 3501 | assertRunsInAtMost("Unregistering callbacks", UNREGISTER_TIME_LIMIT_MS, () -> { |
Hugo Benichi | cbf8ff8 | 2016-11-15 11:25:52 +0900 | [diff] [blame] | 3502 | for (NetworkCallback cb : callbacks) { |
| 3503 | mCm.unregisterNetworkCallback(cb); |
| 3504 | } |
| 3505 | }); |
| 3506 | } |
| 3507 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 3508 | @Test |
Lorenzo Colitti | 762ea7a | 2016-06-05 21:00:23 +0900 | [diff] [blame] | 3509 | public void testMobileDataAlwaysOn() throws Exception { |
paulhu | 86e23eb | 2019-11-05 18:05:05 +0800 | [diff] [blame] | 3510 | grantUsingBackgroundNetworksPermissionForUid(Binder.getCallingUid()); |
Lorenzo Colitti | 762ea7a | 2016-06-05 21:00:23 +0900 | [diff] [blame] | 3511 | final TestNetworkCallback cellNetworkCallback = new TestNetworkCallback(); |
| 3512 | final NetworkRequest cellRequest = new NetworkRequest.Builder() |
| 3513 | .addTransportType(TRANSPORT_CELLULAR).build(); |
| 3514 | mCm.registerNetworkCallback(cellRequest, cellNetworkCallback); |
| 3515 | |
| 3516 | final HandlerThread handlerThread = new HandlerThread("MobileDataAlwaysOnFactory"); |
| 3517 | handlerThread.start(); |
| 3518 | NetworkCapabilities filter = new NetworkCapabilities() |
| 3519 | .addTransportType(TRANSPORT_CELLULAR) |
| 3520 | .addCapability(NET_CAPABILITY_INTERNET); |
| 3521 | final MockNetworkFactory testFactory = new MockNetworkFactory(handlerThread.getLooper(), |
| 3522 | mServiceContext, "testFactory", filter); |
| 3523 | testFactory.setScoreFilter(40); |
| 3524 | |
| 3525 | // Register the factory and expect it to start looking for a network. |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 3526 | testFactory.expectAddRequestsWithScores(0); // Score 0 as the request is not served yet. |
Lorenzo Colitti | 762ea7a | 2016-06-05 21:00:23 +0900 | [diff] [blame] | 3527 | testFactory.register(); |
| 3528 | testFactory.waitForNetworkRequests(1); |
| 3529 | assertTrue(testFactory.getMyStartRequested()); |
| 3530 | |
| 3531 | // Bring up wifi. The factory stops looking for a network. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3532 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 3533 | // Score 60 - 40 penalty for not validated yet, then 60 when it validates |
| 3534 | testFactory.expectAddRequestsWithScores(20, 60); |
Lorenzo Colitti | 762ea7a | 2016-06-05 21:00:23 +0900 | [diff] [blame] | 3535 | mWiFiNetworkAgent.connect(true); |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 3536 | testFactory.waitForRequests(); |
Lorenzo Colitti | 762ea7a | 2016-06-05 21:00:23 +0900 | [diff] [blame] | 3537 | assertFalse(testFactory.getMyStartRequested()); |
| 3538 | |
| 3539 | ContentResolver cr = mServiceContext.getContentResolver(); |
| 3540 | |
| 3541 | // Turn on mobile data always on. The factory starts looking again. |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 3542 | testFactory.expectAddRequestsWithScores(0); // Always on requests comes up with score 0 |
Leif Hendrik Wilden | fd30663 | 2018-05-02 12:05:24 -0700 | [diff] [blame] | 3543 | setAlwaysOnNetworks(true); |
Lorenzo Colitti | 762ea7a | 2016-06-05 21:00:23 +0900 | [diff] [blame] | 3544 | testFactory.waitForNetworkRequests(2); |
| 3545 | assertTrue(testFactory.getMyStartRequested()); |
| 3546 | |
| 3547 | // Bring up cell data and check that the factory stops looking. |
Hugo Benichi | fed512a | 2017-06-26 10:06:49 +0900 | [diff] [blame] | 3548 | assertLength(1, mCm.getAllNetworks()); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3549 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 3550 | testFactory.expectAddRequestsWithScores(10, 50); // Unvalidated, then validated |
Lorenzo Colitti | 762ea7a | 2016-06-05 21:00:23 +0900 | [diff] [blame] | 3551 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3552 | cellNetworkCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
Lorenzo Colitti | 762ea7a | 2016-06-05 21:00:23 +0900 | [diff] [blame] | 3553 | testFactory.waitForNetworkRequests(2); |
| 3554 | assertFalse(testFactory.getMyStartRequested()); // Because the cell network outscores us. |
| 3555 | |
| 3556 | // Check that cell data stays up. |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 3557 | waitForIdle(); |
Lorenzo Colitti | 762ea7a | 2016-06-05 21:00:23 +0900 | [diff] [blame] | 3558 | verifyActiveNetwork(TRANSPORT_WIFI); |
Hugo Benichi | fed512a | 2017-06-26 10:06:49 +0900 | [diff] [blame] | 3559 | assertLength(2, mCm.getAllNetworks()); |
Lorenzo Colitti | 762ea7a | 2016-06-05 21:00:23 +0900 | [diff] [blame] | 3560 | |
| 3561 | // Turn off mobile data always on and expect the request to disappear... |
| 3562 | testFactory.expectRemoveRequests(1); |
Leif Hendrik Wilden | fd30663 | 2018-05-02 12:05:24 -0700 | [diff] [blame] | 3563 | setAlwaysOnNetworks(false); |
Lorenzo Colitti | 762ea7a | 2016-06-05 21:00:23 +0900 | [diff] [blame] | 3564 | testFactory.waitForNetworkRequests(1); |
| 3565 | |
| 3566 | // ... and cell data to be torn down. |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3567 | cellNetworkCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
Hugo Benichi | fed512a | 2017-06-26 10:06:49 +0900 | [diff] [blame] | 3568 | assertLength(1, mCm.getAllNetworks()); |
Lorenzo Colitti | 762ea7a | 2016-06-05 21:00:23 +0900 | [diff] [blame] | 3569 | |
Lorenzo Colitti | f1080a9 | 2020-03-02 19:46:35 +0900 | [diff] [blame] | 3570 | testFactory.terminate(); |
Lorenzo Colitti | 762ea7a | 2016-06-05 21:00:23 +0900 | [diff] [blame] | 3571 | mCm.unregisterNetworkCallback(cellNetworkCallback); |
| 3572 | handlerThread.quit(); |
| 3573 | } |
| 3574 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 3575 | @Test |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3576 | public void testAvoidBadWifiSetting() throws Exception { |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3577 | final ContentResolver cr = mServiceContext.getContentResolver(); |
| 3578 | final String settingName = Settings.Global.NETWORK_AVOID_BAD_WIFI; |
| 3579 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3580 | mPolicyTracker.mConfigRestrictsAvoidBadWifi = false; |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3581 | String[] values = new String[] {null, "0", "1"}; |
| 3582 | for (int i = 0; i < values.length; i++) { |
| 3583 | Settings.Global.putInt(cr, settingName, 1); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3584 | mPolicyTracker.reevaluate(); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 3585 | waitForIdle(); |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3586 | String msg = String.format("config=false, setting=%s", values[i]); |
Lorenzo Colitti | 30145d7 | 2017-01-27 18:46:03 +0900 | [diff] [blame] | 3587 | assertTrue(mService.avoidBadWifi()); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3588 | assertFalse(msg, mPolicyTracker.shouldNotifyWifiUnvalidated()); |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3589 | } |
| 3590 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3591 | mPolicyTracker.mConfigRestrictsAvoidBadWifi = true; |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3592 | |
| 3593 | Settings.Global.putInt(cr, settingName, 0); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3594 | mPolicyTracker.reevaluate(); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 3595 | waitForIdle(); |
Lorenzo Colitti | 30145d7 | 2017-01-27 18:46:03 +0900 | [diff] [blame] | 3596 | assertFalse(mService.avoidBadWifi()); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3597 | assertFalse(mPolicyTracker.shouldNotifyWifiUnvalidated()); |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3598 | |
| 3599 | Settings.Global.putInt(cr, settingName, 1); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3600 | mPolicyTracker.reevaluate(); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 3601 | waitForIdle(); |
Lorenzo Colitti | 30145d7 | 2017-01-27 18:46:03 +0900 | [diff] [blame] | 3602 | assertTrue(mService.avoidBadWifi()); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3603 | assertFalse(mPolicyTracker.shouldNotifyWifiUnvalidated()); |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3604 | |
| 3605 | Settings.Global.putString(cr, settingName, null); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3606 | mPolicyTracker.reevaluate(); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 3607 | waitForIdle(); |
Lorenzo Colitti | 30145d7 | 2017-01-27 18:46:03 +0900 | [diff] [blame] | 3608 | assertFalse(mService.avoidBadWifi()); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3609 | assertTrue(mPolicyTracker.shouldNotifyWifiUnvalidated()); |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3610 | } |
| 3611 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 3612 | @Test |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3613 | public void testAvoidBadWifi() throws Exception { |
Erik Kline | 065ab6e | 2016-10-02 18:02:14 +0900 | [diff] [blame] | 3614 | final ContentResolver cr = mServiceContext.getContentResolver(); |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3615 | |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3616 | // Pretend we're on a carrier that restricts switching away from bad wifi. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3617 | mPolicyTracker.mConfigRestrictsAvoidBadWifi = true; |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3618 | |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3619 | // File a request for cell to ensure it doesn't go down. |
| 3620 | final TestNetworkCallback cellNetworkCallback = new TestNetworkCallback(); |
| 3621 | final NetworkRequest cellRequest = new NetworkRequest.Builder() |
| 3622 | .addTransportType(TRANSPORT_CELLULAR).build(); |
| 3623 | mCm.requestNetwork(cellRequest, cellNetworkCallback); |
| 3624 | |
| 3625 | TestNetworkCallback defaultCallback = new TestNetworkCallback(); |
| 3626 | mCm.registerDefaultNetworkCallback(defaultCallback); |
| 3627 | |
| 3628 | NetworkRequest validatedWifiRequest = new NetworkRequest.Builder() |
| 3629 | .addTransportType(TRANSPORT_WIFI) |
| 3630 | .addCapability(NET_CAPABILITY_VALIDATED) |
| 3631 | .build(); |
| 3632 | TestNetworkCallback validatedWifiCallback = new TestNetworkCallback(); |
| 3633 | mCm.registerNetworkCallback(validatedWifiRequest, validatedWifiCallback); |
| 3634 | |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3635 | Settings.Global.putInt(cr, Settings.Global.NETWORK_AVOID_BAD_WIFI, 0); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3636 | mPolicyTracker.reevaluate(); |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3637 | |
| 3638 | // Bring up validated cell. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3639 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3640 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3641 | cellNetworkCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
| 3642 | defaultCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3643 | Network cellNetwork = mCellNetworkAgent.getNetwork(); |
| 3644 | |
| 3645 | // Bring up validated wifi. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3646 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3647 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3648 | defaultCallback.expectAvailableDoubleValidatedCallbacks(mWiFiNetworkAgent); |
| 3649 | validatedWifiCallback.expectAvailableDoubleValidatedCallbacks(mWiFiNetworkAgent); |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3650 | Network wifiNetwork = mWiFiNetworkAgent.getNetwork(); |
| 3651 | |
| 3652 | // Fail validation on wifi. |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 3653 | mWiFiNetworkAgent.setNetworkInvalid(false /* isStrictMode */); |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3654 | mCm.reportNetworkConnectivity(wifiNetwork, false); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3655 | defaultCallback.expectCapabilitiesWithout(NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3656 | validatedWifiCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3657 | |
| 3658 | // Because avoid bad wifi is off, we don't switch to cellular. |
| 3659 | defaultCallback.assertNoCallback(); |
| 3660 | assertFalse(mCm.getNetworkCapabilities(wifiNetwork).hasCapability( |
| 3661 | NET_CAPABILITY_VALIDATED)); |
| 3662 | assertTrue(mCm.getNetworkCapabilities(cellNetwork).hasCapability( |
| 3663 | NET_CAPABILITY_VALIDATED)); |
| 3664 | assertEquals(mCm.getActiveNetwork(), wifiNetwork); |
| 3665 | |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3666 | // Simulate switching to a carrier that does not restrict avoiding bad wifi, and expect |
| 3667 | // that we switch back to cell. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3668 | mPolicyTracker.mConfigRestrictsAvoidBadWifi = false; |
| 3669 | mPolicyTracker.reevaluate(); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3670 | defaultCallback.expectAvailableCallbacksValidated(mCellNetworkAgent); |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3671 | assertEquals(mCm.getActiveNetwork(), cellNetwork); |
| 3672 | |
| 3673 | // Switch back to a restrictive carrier. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3674 | mPolicyTracker.mConfigRestrictsAvoidBadWifi = true; |
| 3675 | mPolicyTracker.reevaluate(); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3676 | defaultCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3677 | assertEquals(mCm.getActiveNetwork(), wifiNetwork); |
| 3678 | |
| 3679 | // Simulate the user selecting "switch" on the dialog, and check that we switch to cell. |
| 3680 | mCm.setAvoidUnvalidated(wifiNetwork); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3681 | defaultCallback.expectAvailableCallbacksValidated(mCellNetworkAgent); |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3682 | assertFalse(mCm.getNetworkCapabilities(wifiNetwork).hasCapability( |
| 3683 | NET_CAPABILITY_VALIDATED)); |
| 3684 | assertTrue(mCm.getNetworkCapabilities(cellNetwork).hasCapability( |
| 3685 | NET_CAPABILITY_VALIDATED)); |
| 3686 | assertEquals(mCm.getActiveNetwork(), cellNetwork); |
| 3687 | |
| 3688 | // Disconnect and reconnect wifi to clear the one-time switch above. |
| 3689 | mWiFiNetworkAgent.disconnect(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3690 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3691 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3692 | defaultCallback.expectAvailableDoubleValidatedCallbacks(mWiFiNetworkAgent); |
| 3693 | validatedWifiCallback.expectAvailableDoubleValidatedCallbacks(mWiFiNetworkAgent); |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3694 | wifiNetwork = mWiFiNetworkAgent.getNetwork(); |
| 3695 | |
| 3696 | // Fail validation on wifi and expect the dialog to appear. |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 3697 | mWiFiNetworkAgent.setNetworkInvalid(false /* isStrictMode */); |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3698 | mCm.reportNetworkConnectivity(wifiNetwork, false); |
Erik Kline | 1d3db32 | 2017-02-28 16:20:20 +0900 | [diff] [blame] | 3699 | defaultCallback.expectCapabilitiesWithout(NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3700 | validatedWifiCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3701 | |
| 3702 | // Simulate the user selecting "switch" and checking the don't ask again checkbox. |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3703 | Settings.Global.putInt(cr, Settings.Global.NETWORK_AVOID_BAD_WIFI, 1); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3704 | mPolicyTracker.reevaluate(); |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3705 | |
| 3706 | // We now switch to cell. |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3707 | defaultCallback.expectAvailableCallbacksValidated(mCellNetworkAgent); |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3708 | assertFalse(mCm.getNetworkCapabilities(wifiNetwork).hasCapability( |
| 3709 | NET_CAPABILITY_VALIDATED)); |
| 3710 | assertTrue(mCm.getNetworkCapabilities(cellNetwork).hasCapability( |
| 3711 | NET_CAPABILITY_VALIDATED)); |
| 3712 | assertEquals(mCm.getActiveNetwork(), cellNetwork); |
| 3713 | |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3714 | // Simulate the user turning the cellular fallback setting off and then on. |
| 3715 | // We switch to wifi and then to cell. |
| 3716 | Settings.Global.putString(cr, Settings.Global.NETWORK_AVOID_BAD_WIFI, null); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3717 | mPolicyTracker.reevaluate(); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3718 | defaultCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3719 | assertEquals(mCm.getActiveNetwork(), wifiNetwork); |
| 3720 | Settings.Global.putInt(cr, Settings.Global.NETWORK_AVOID_BAD_WIFI, 1); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3721 | mPolicyTracker.reevaluate(); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3722 | defaultCallback.expectAvailableCallbacksValidated(mCellNetworkAgent); |
Lorenzo Colitti | 165c51c | 2016-09-19 01:00:19 +0900 | [diff] [blame] | 3723 | assertEquals(mCm.getActiveNetwork(), cellNetwork); |
| 3724 | |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3725 | // If cell goes down, we switch to wifi. |
| 3726 | mCellNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3727 | defaultCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 3728 | defaultCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Lorenzo Colitti | 73b20938 | 2016-09-15 22:18:09 +0900 | [diff] [blame] | 3729 | validatedWifiCallback.assertNoCallback(); |
| 3730 | |
| 3731 | mCm.unregisterNetworkCallback(cellNetworkCallback); |
| 3732 | mCm.unregisterNetworkCallback(validatedWifiCallback); |
| 3733 | mCm.unregisterNetworkCallback(defaultCallback); |
| 3734 | } |
| 3735 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 3736 | @Test |
Lorenzo Colitti | 2de4925 | 2017-01-24 18:08:41 +0900 | [diff] [blame] | 3737 | public void testMeteredMultipathPreferenceSetting() throws Exception { |
| 3738 | final ContentResolver cr = mServiceContext.getContentResolver(); |
Lorenzo Colitti | 2de4925 | 2017-01-24 18:08:41 +0900 | [diff] [blame] | 3739 | final String settingName = Settings.Global.NETWORK_METERED_MULTIPATH_PREFERENCE; |
| 3740 | |
| 3741 | for (int config : Arrays.asList(0, 3, 2)) { |
| 3742 | for (String setting: Arrays.asList(null, "0", "2", "1")) { |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3743 | mPolicyTracker.mConfigMeteredMultipathPreference = config; |
Lorenzo Colitti | 2de4925 | 2017-01-24 18:08:41 +0900 | [diff] [blame] | 3744 | Settings.Global.putString(cr, settingName, setting); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3745 | mPolicyTracker.reevaluate(); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 3746 | waitForIdle(); |
Lorenzo Colitti | 2de4925 | 2017-01-24 18:08:41 +0900 | [diff] [blame] | 3747 | |
| 3748 | final int expected = (setting != null) ? Integer.parseInt(setting) : config; |
| 3749 | String msg = String.format("config=%d, setting=%s", config, setting); |
| 3750 | assertEquals(msg, expected, mCm.getMultipathPreference(null)); |
| 3751 | } |
| 3752 | } |
| 3753 | } |
| 3754 | |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3755 | /** |
| 3756 | * Validate that a satisfied network request does not trigger onUnavailable() once the |
| 3757 | * time-out period expires. |
| 3758 | */ |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 3759 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 3760 | public void testSatisfiedNetworkRequestDoesNotTriggerOnUnavailable() throws Exception { |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3761 | NetworkRequest nr = new NetworkRequest.Builder().addTransportType( |
| 3762 | NetworkCapabilities.TRANSPORT_WIFI).build(); |
| 3763 | final TestNetworkCallback networkCallback = new TestNetworkCallback(); |
Remi NGUYEN VAN | 4cb8062 | 2018-07-27 15:37:13 +0900 | [diff] [blame] | 3764 | mCm.requestNetwork(nr, networkCallback, TEST_REQUEST_TIMEOUT_MS); |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3765 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3766 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3767 | mWiFiNetworkAgent.connect(false); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 3768 | networkCallback.expectAvailableCallbacks(mWiFiNetworkAgent, false, false, false, |
Remi NGUYEN VAN | a7376ac | 2018-07-26 18:41:36 +0900 | [diff] [blame] | 3769 | TEST_CALLBACK_TIMEOUT_MS); |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3770 | |
| 3771 | // pass timeout and validate that UNAVAILABLE is not called |
Etan Cohen | bf3b1ba | 2016-10-27 15:05:50 -0700 | [diff] [blame] | 3772 | networkCallback.assertNoCallback(); |
| 3773 | } |
| 3774 | |
| 3775 | /** |
| 3776 | * Validate that a satisfied network request followed by a disconnected (lost) network does |
| 3777 | * not trigger onUnavailable() once the time-out period expires. |
| 3778 | */ |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 3779 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 3780 | public void testSatisfiedThenLostNetworkRequestDoesNotTriggerOnUnavailable() throws Exception { |
Etan Cohen | bf3b1ba | 2016-10-27 15:05:50 -0700 | [diff] [blame] | 3781 | NetworkRequest nr = new NetworkRequest.Builder().addTransportType( |
| 3782 | NetworkCapabilities.TRANSPORT_WIFI).build(); |
| 3783 | final TestNetworkCallback networkCallback = new TestNetworkCallback(); |
Remi NGUYEN VAN | 4cb8062 | 2018-07-27 15:37:13 +0900 | [diff] [blame] | 3784 | mCm.requestNetwork(nr, networkCallback, TEST_REQUEST_TIMEOUT_MS); |
Etan Cohen | bf3b1ba | 2016-10-27 15:05:50 -0700 | [diff] [blame] | 3785 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3786 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Etan Cohen | bf3b1ba | 2016-10-27 15:05:50 -0700 | [diff] [blame] | 3787 | mWiFiNetworkAgent.connect(false); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 3788 | networkCallback.expectAvailableCallbacks(mWiFiNetworkAgent, false, false, false, |
Remi NGUYEN VAN | a7376ac | 2018-07-26 18:41:36 +0900 | [diff] [blame] | 3789 | TEST_CALLBACK_TIMEOUT_MS); |
Etan Cohen | bf3b1ba | 2016-10-27 15:05:50 -0700 | [diff] [blame] | 3790 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 3791 | networkCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Etan Cohen | bf3b1ba | 2016-10-27 15:05:50 -0700 | [diff] [blame] | 3792 | |
Hugo Benichi | 91c7ff9 | 2017-06-26 10:20:00 +0900 | [diff] [blame] | 3793 | // Validate that UNAVAILABLE is not called |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3794 | networkCallback.assertNoCallback(); |
| 3795 | } |
| 3796 | |
| 3797 | /** |
| 3798 | * Validate that when a time-out is specified for a network request the onUnavailable() |
| 3799 | * callback is called when time-out expires. Then validate that if network request is |
| 3800 | * (somehow) satisfied - the callback isn't called later. |
| 3801 | */ |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 3802 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 3803 | public void testTimedoutNetworkRequest() throws Exception { |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3804 | NetworkRequest nr = new NetworkRequest.Builder().addTransportType( |
| 3805 | NetworkCapabilities.TRANSPORT_WIFI).build(); |
| 3806 | final TestNetworkCallback networkCallback = new TestNetworkCallback(); |
Hugo Benichi | dfb559a | 2016-12-20 14:57:49 +0900 | [diff] [blame] | 3807 | final int timeoutMs = 10; |
| 3808 | mCm.requestNetwork(nr, networkCallback, timeoutMs); |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3809 | |
| 3810 | // pass timeout and validate that UNAVAILABLE is called |
Automerger Merge Worker | 6b606b3 | 2020-03-14 05:13:42 +0000 | [diff] [blame] | 3811 | networkCallback.expectCallback(CallbackEntry.UNAVAILABLE, (Network) null); |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3812 | |
| 3813 | // create a network satisfying request - validate that request not triggered |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3814 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3815 | mWiFiNetworkAgent.connect(false); |
| 3816 | networkCallback.assertNoCallback(); |
| 3817 | } |
| 3818 | |
| 3819 | /** |
Hugo Benichi | 91c7ff9 | 2017-06-26 10:20:00 +0900 | [diff] [blame] | 3820 | * Validate that when a network request is unregistered (cancelled), no posterior event can |
| 3821 | * trigger the callback. |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3822 | */ |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 3823 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 3824 | public void testNoCallbackAfterUnregisteredNetworkRequest() throws Exception { |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3825 | NetworkRequest nr = new NetworkRequest.Builder().addTransportType( |
| 3826 | NetworkCapabilities.TRANSPORT_WIFI).build(); |
| 3827 | final TestNetworkCallback networkCallback = new TestNetworkCallback(); |
Hugo Benichi | dfb559a | 2016-12-20 14:57:49 +0900 | [diff] [blame] | 3828 | final int timeoutMs = 10; |
Hugo Benichi | 91c7ff9 | 2017-06-26 10:20:00 +0900 | [diff] [blame] | 3829 | |
Hugo Benichi | dfb559a | 2016-12-20 14:57:49 +0900 | [diff] [blame] | 3830 | mCm.requestNetwork(nr, networkCallback, timeoutMs); |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3831 | mCm.unregisterNetworkCallback(networkCallback); |
Hugo Benichi | 91c7ff9 | 2017-06-26 10:20:00 +0900 | [diff] [blame] | 3832 | // Regardless of the timeout, unregistering the callback in ConnectivityManager ensures |
| 3833 | // that this callback will not be called. |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3834 | networkCallback.assertNoCallback(); |
| 3835 | |
| 3836 | // create a network satisfying request - validate that request not triggered |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 3837 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Erik Kline | 3841a48 | 2015-11-25 12:49:38 +0900 | [diff] [blame] | 3838 | mWiFiNetworkAgent.connect(false); |
| 3839 | networkCallback.assertNoCallback(); |
| 3840 | } |
| 3841 | |
Etan Cohen | 4a62d1d | 2019-05-21 12:06:04 -0700 | [diff] [blame] | 3842 | @Test |
| 3843 | public void testUnfulfillableNetworkRequest() throws Exception { |
| 3844 | runUnfulfillableNetworkRequest(false); |
| 3845 | } |
| 3846 | |
| 3847 | @Test |
| 3848 | public void testUnfulfillableNetworkRequestAfterUnregister() throws Exception { |
| 3849 | runUnfulfillableNetworkRequest(true); |
| 3850 | } |
| 3851 | |
Etan Cohen | ddb720a | 2019-01-08 12:09:18 -0800 | [diff] [blame] | 3852 | /** |
| 3853 | * Validate the callback flow for a factory releasing a request as unfulfillable. |
| 3854 | */ |
Etan Cohen | 4a62d1d | 2019-05-21 12:06:04 -0700 | [diff] [blame] | 3855 | private void runUnfulfillableNetworkRequest(boolean preUnregister) throws Exception { |
Etan Cohen | ddb720a | 2019-01-08 12:09:18 -0800 | [diff] [blame] | 3856 | NetworkRequest nr = new NetworkRequest.Builder().addTransportType( |
| 3857 | NetworkCapabilities.TRANSPORT_WIFI).build(); |
| 3858 | final TestNetworkCallback networkCallback = new TestNetworkCallback(); |
| 3859 | |
| 3860 | final HandlerThread handlerThread = new HandlerThread("testUnfulfillableNetworkRequest"); |
| 3861 | handlerThread.start(); |
| 3862 | NetworkCapabilities filter = new NetworkCapabilities() |
| 3863 | .addTransportType(TRANSPORT_WIFI) |
| 3864 | .addCapability(NET_CAPABILITY_INTERNET); |
| 3865 | final MockNetworkFactory testFactory = new MockNetworkFactory(handlerThread.getLooper(), |
| 3866 | mServiceContext, "testFactory", filter); |
| 3867 | testFactory.setScoreFilter(40); |
| 3868 | |
| 3869 | // Register the factory and expect it to receive the default request. |
Etan Cohen | ae574a8 | 2019-01-08 12:09:18 -0800 | [diff] [blame] | 3870 | testFactory.expectAddRequestsWithScores(0); |
Etan Cohen | ddb720a | 2019-01-08 12:09:18 -0800 | [diff] [blame] | 3871 | testFactory.register(); |
| 3872 | SparseArray<NetworkRequest> requests = testFactory.waitForNetworkRequests(1); |
| 3873 | |
| 3874 | assertEquals(1, requests.size()); // have 1 request at this point |
| 3875 | int origRequestId = requests.valueAt(0).requestId; |
| 3876 | |
| 3877 | // Now file the test request and expect it. |
Chalard Jean | 05ab681 | 2018-05-02 21:14:54 +0900 | [diff] [blame] | 3878 | testFactory.expectAddRequestsWithScores(0); |
Etan Cohen | ddb720a | 2019-01-08 12:09:18 -0800 | [diff] [blame] | 3879 | mCm.requestNetwork(nr, networkCallback); |
| 3880 | requests = testFactory.waitForNetworkRequests(2); // have 2 requests at this point |
| 3881 | |
| 3882 | int newRequestId = 0; |
| 3883 | for (int i = 0; i < requests.size(); ++i) { |
| 3884 | if (requests.valueAt(i).requestId != origRequestId) { |
| 3885 | newRequestId = requests.valueAt(i).requestId; |
| 3886 | break; |
| 3887 | } |
| 3888 | } |
| 3889 | |
Etan Cohen | 22e0fc1 | 2019-05-23 08:16:20 -0700 | [diff] [blame] | 3890 | testFactory.expectRemoveRequests(1); |
Etan Cohen | 4a62d1d | 2019-05-21 12:06:04 -0700 | [diff] [blame] | 3891 | if (preUnregister) { |
| 3892 | mCm.unregisterNetworkCallback(networkCallback); |
Etan Cohen | ddb720a | 2019-01-08 12:09:18 -0800 | [diff] [blame] | 3893 | |
Etan Cohen | 4a62d1d | 2019-05-21 12:06:04 -0700 | [diff] [blame] | 3894 | // Simulate the factory releasing the request as unfulfillable: no-op since |
| 3895 | // the callback has already been unregistered (but a test that no exceptions are |
| 3896 | // thrown). |
| 3897 | testFactory.triggerUnfulfillable(requests.get(newRequestId)); |
| 3898 | } else { |
| 3899 | // Simulate the factory releasing the request as unfulfillable and expect onUnavailable! |
Etan Cohen | 4a62d1d | 2019-05-21 12:06:04 -0700 | [diff] [blame] | 3900 | testFactory.triggerUnfulfillable(requests.get(newRequestId)); |
| 3901 | |
Automerger Merge Worker | 6b606b3 | 2020-03-14 05:13:42 +0000 | [diff] [blame] | 3902 | networkCallback.expectCallback(CallbackEntry.UNAVAILABLE, (Network) null); |
Etan Cohen | 4a62d1d | 2019-05-21 12:06:04 -0700 | [diff] [blame] | 3903 | testFactory.waitForRequests(); |
| 3904 | |
| 3905 | // unregister network callback - a no-op (since already freed by the |
| 3906 | // on-unavailable), but should not fail or throw exceptions. |
| 3907 | mCm.unregisterNetworkCallback(networkCallback); |
| 3908 | } |
Etan Cohen | 9b09a16 | 2019-04-16 15:07:55 -0700 | [diff] [blame] | 3909 | |
Lorenzo Colitti | f1080a9 | 2020-03-02 19:46:35 +0900 | [diff] [blame] | 3910 | testFactory.terminate(); |
Etan Cohen | ddb720a | 2019-01-08 12:09:18 -0800 | [diff] [blame] | 3911 | handlerThread.quit(); |
| 3912 | } |
| 3913 | |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 3914 | private static class TestKeepaliveCallback extends PacketKeepaliveCallback { |
| 3915 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 3916 | public enum CallbackType { ON_STARTED, ON_STOPPED, ON_ERROR } |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 3917 | |
| 3918 | private class CallbackValue { |
| 3919 | public CallbackType callbackType; |
| 3920 | public int error; |
| 3921 | |
| 3922 | public CallbackValue(CallbackType type) { |
| 3923 | this.callbackType = type; |
| 3924 | this.error = PacketKeepalive.SUCCESS; |
| 3925 | assertTrue("onError callback must have error", type != CallbackType.ON_ERROR); |
| 3926 | } |
| 3927 | |
| 3928 | public CallbackValue(CallbackType type, int error) { |
| 3929 | this.callbackType = type; |
| 3930 | this.error = error; |
| 3931 | assertEquals("error can only be set for onError", type, CallbackType.ON_ERROR); |
| 3932 | } |
| 3933 | |
| 3934 | @Override |
| 3935 | public boolean equals(Object o) { |
| 3936 | return o instanceof CallbackValue && |
| 3937 | this.callbackType == ((CallbackValue) o).callbackType && |
| 3938 | this.error == ((CallbackValue) o).error; |
| 3939 | } |
| 3940 | |
| 3941 | @Override |
| 3942 | public String toString() { |
| 3943 | return String.format("%s(%s, %d)", getClass().getSimpleName(), callbackType, error); |
| 3944 | } |
| 3945 | } |
| 3946 | |
junyulai | 7c46917 | 2019-01-16 20:23:34 +0800 | [diff] [blame] | 3947 | private final LinkedBlockingQueue<CallbackValue> mCallbacks = new LinkedBlockingQueue<>(); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 3948 | |
| 3949 | @Override |
| 3950 | public void onStarted() { |
| 3951 | mCallbacks.add(new CallbackValue(CallbackType.ON_STARTED)); |
| 3952 | } |
| 3953 | |
| 3954 | @Override |
| 3955 | public void onStopped() { |
| 3956 | mCallbacks.add(new CallbackValue(CallbackType.ON_STOPPED)); |
| 3957 | } |
| 3958 | |
| 3959 | @Override |
| 3960 | public void onError(int error) { |
| 3961 | mCallbacks.add(new CallbackValue(CallbackType.ON_ERROR, error)); |
| 3962 | } |
| 3963 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 3964 | private void expectCallback(CallbackValue callbackValue) throws InterruptedException { |
| 3965 | assertEquals(callbackValue, mCallbacks.poll(TIMEOUT_MS, TimeUnit.MILLISECONDS)); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 3966 | } |
| 3967 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 3968 | public void expectStarted() throws Exception { |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 3969 | expectCallback(new CallbackValue(CallbackType.ON_STARTED)); |
| 3970 | } |
| 3971 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 3972 | public void expectStopped() throws Exception { |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 3973 | expectCallback(new CallbackValue(CallbackType.ON_STOPPED)); |
| 3974 | } |
| 3975 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 3976 | public void expectError(int error) throws Exception { |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 3977 | expectCallback(new CallbackValue(CallbackType.ON_ERROR, error)); |
| 3978 | } |
| 3979 | } |
| 3980 | |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 3981 | private static class TestSocketKeepaliveCallback extends SocketKeepalive.Callback { |
| 3982 | |
| 3983 | public enum CallbackType { ON_STARTED, ON_STOPPED, ON_ERROR }; |
| 3984 | |
| 3985 | private class CallbackValue { |
| 3986 | public CallbackType callbackType; |
| 3987 | public int error; |
| 3988 | |
| 3989 | CallbackValue(CallbackType type) { |
| 3990 | this.callbackType = type; |
| 3991 | this.error = SocketKeepalive.SUCCESS; |
| 3992 | assertTrue("onError callback must have error", type != CallbackType.ON_ERROR); |
| 3993 | } |
| 3994 | |
| 3995 | CallbackValue(CallbackType type, int error) { |
| 3996 | this.callbackType = type; |
| 3997 | this.error = error; |
| 3998 | assertEquals("error can only be set for onError", type, CallbackType.ON_ERROR); |
| 3999 | } |
| 4000 | |
| 4001 | @Override |
| 4002 | public boolean equals(Object o) { |
| 4003 | return o instanceof CallbackValue |
| 4004 | && this.callbackType == ((CallbackValue) o).callbackType |
| 4005 | && this.error == ((CallbackValue) o).error; |
| 4006 | } |
| 4007 | |
| 4008 | @Override |
| 4009 | public String toString() { |
| 4010 | return String.format("%s(%s, %d)", getClass().getSimpleName(), callbackType, |
| 4011 | error); |
| 4012 | } |
| 4013 | } |
| 4014 | |
| 4015 | private LinkedBlockingQueue<CallbackValue> mCallbacks = new LinkedBlockingQueue<>(); |
junyulai | 7c46917 | 2019-01-16 20:23:34 +0800 | [diff] [blame] | 4016 | private final Executor mExecutor; |
| 4017 | |
| 4018 | TestSocketKeepaliveCallback(@NonNull Executor executor) { |
| 4019 | mExecutor = executor; |
| 4020 | } |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4021 | |
| 4022 | @Override |
| 4023 | public void onStarted() { |
| 4024 | mCallbacks.add(new CallbackValue(CallbackType.ON_STARTED)); |
| 4025 | } |
| 4026 | |
| 4027 | @Override |
| 4028 | public void onStopped() { |
| 4029 | mCallbacks.add(new CallbackValue(CallbackType.ON_STOPPED)); |
| 4030 | } |
| 4031 | |
| 4032 | @Override |
| 4033 | public void onError(int error) { |
| 4034 | mCallbacks.add(new CallbackValue(CallbackType.ON_ERROR, error)); |
| 4035 | } |
| 4036 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 4037 | private void expectCallback(CallbackValue callbackValue) throws InterruptedException { |
| 4038 | assertEquals(callbackValue, mCallbacks.poll(TIMEOUT_MS, TimeUnit.MILLISECONDS)); |
| 4039 | |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4040 | } |
| 4041 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 4042 | public void expectStarted() throws InterruptedException { |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4043 | expectCallback(new CallbackValue(CallbackType.ON_STARTED)); |
| 4044 | } |
| 4045 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 4046 | public void expectStopped() throws InterruptedException { |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4047 | expectCallback(new CallbackValue(CallbackType.ON_STOPPED)); |
| 4048 | } |
| 4049 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 4050 | public void expectError(int error) throws InterruptedException { |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4051 | expectCallback(new CallbackValue(CallbackType.ON_ERROR, error)); |
| 4052 | } |
junyulai | 7c46917 | 2019-01-16 20:23:34 +0800 | [diff] [blame] | 4053 | |
| 4054 | public void assertNoCallback() { |
Chalard Jean | 9c0ff1b | 2019-05-30 17:11:14 +0900 | [diff] [blame] | 4055 | waitForIdleSerialExecutor(mExecutor, TIMEOUT_MS); |
junyulai | 7c46917 | 2019-01-16 20:23:34 +0800 | [diff] [blame] | 4056 | CallbackValue cv = mCallbacks.peek(); |
| 4057 | assertNull("Unexpected callback: " + cv, cv); |
| 4058 | } |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4059 | } |
| 4060 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 4061 | private Network connectKeepaliveNetwork(LinkProperties lp) throws Exception { |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4062 | // Ensure the network is disconnected before we do anything. |
| 4063 | if (mWiFiNetworkAgent != null) { |
| 4064 | assertNull(mCm.getNetworkCapabilities(mWiFiNetworkAgent.getNetwork())); |
| 4065 | } |
| 4066 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4067 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 4068 | ExpectedBroadcast b = expectConnectivityAction(TYPE_WIFI, DetailedState.CONNECTED); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4069 | mWiFiNetworkAgent.connect(true); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 4070 | b.expectBroadcast(); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4071 | verifyActiveNetwork(TRANSPORT_WIFI); |
| 4072 | mWiFiNetworkAgent.sendLinkProperties(lp); |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 4073 | waitForIdle(); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4074 | return mWiFiNetworkAgent.getNetwork(); |
| 4075 | } |
| 4076 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 4077 | @Test |
Guang Zhu | b90866d | 2019-09-01 21:37:04 -0700 | [diff] [blame] | 4078 | @FlakyTest(bugId = 140305589) |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4079 | public void testPacketKeepalives() throws Exception { |
| 4080 | InetAddress myIPv4 = InetAddress.getByName("192.0.2.129"); |
| 4081 | InetAddress notMyIPv4 = InetAddress.getByName("192.0.2.35"); |
| 4082 | InetAddress myIPv6 = InetAddress.getByName("2001:db8::1"); |
| 4083 | InetAddress dstIPv4 = InetAddress.getByName("8.8.8.8"); |
| 4084 | InetAddress dstIPv6 = InetAddress.getByName("2001:4860:4860::8888"); |
| 4085 | |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4086 | final int validKaInterval = 15; |
| 4087 | final int invalidKaInterval = 9; |
| 4088 | |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4089 | LinkProperties lp = new LinkProperties(); |
| 4090 | lp.setInterfaceName("wlan12"); |
| 4091 | lp.addLinkAddress(new LinkAddress(myIPv6, 64)); |
| 4092 | lp.addLinkAddress(new LinkAddress(myIPv4, 25)); |
| 4093 | lp.addRoute(new RouteInfo(InetAddress.getByName("fe80::1234"))); |
| 4094 | lp.addRoute(new RouteInfo(InetAddress.getByName("192.0.2.254"))); |
| 4095 | |
| 4096 | Network notMyNet = new Network(61234); |
| 4097 | Network myNet = connectKeepaliveNetwork(lp); |
| 4098 | |
| 4099 | TestKeepaliveCallback callback = new TestKeepaliveCallback(); |
| 4100 | PacketKeepalive ka; |
| 4101 | |
| 4102 | // Attempt to start keepalives with invalid parameters and check for errors. |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4103 | ka = mCm.startNattKeepalive(notMyNet, validKaInterval, callback, myIPv4, 1234, dstIPv4); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4104 | callback.expectError(PacketKeepalive.ERROR_INVALID_NETWORK); |
| 4105 | |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4106 | ka = mCm.startNattKeepalive(myNet, invalidKaInterval, callback, myIPv4, 1234, dstIPv4); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4107 | callback.expectError(PacketKeepalive.ERROR_INVALID_INTERVAL); |
| 4108 | |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4109 | ka = mCm.startNattKeepalive(myNet, validKaInterval, callback, myIPv4, 1234, dstIPv6); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4110 | callback.expectError(PacketKeepalive.ERROR_INVALID_IP_ADDRESS); |
| 4111 | |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4112 | ka = mCm.startNattKeepalive(myNet, validKaInterval, callback, myIPv6, 1234, dstIPv4); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4113 | callback.expectError(PacketKeepalive.ERROR_INVALID_IP_ADDRESS); |
| 4114 | |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4115 | // NAT-T is only supported for IPv4. |
| 4116 | ka = mCm.startNattKeepalive(myNet, validKaInterval, callback, myIPv6, 1234, dstIPv6); |
| 4117 | callback.expectError(PacketKeepalive.ERROR_INVALID_IP_ADDRESS); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4118 | |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4119 | ka = mCm.startNattKeepalive(myNet, validKaInterval, callback, myIPv4, 123456, dstIPv4); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4120 | callback.expectError(PacketKeepalive.ERROR_INVALID_PORT); |
| 4121 | |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4122 | ka = mCm.startNattKeepalive(myNet, validKaInterval, callback, myIPv4, 123456, dstIPv4); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4123 | callback.expectError(PacketKeepalive.ERROR_INVALID_PORT); |
| 4124 | |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4125 | ka = mCm.startNattKeepalive(myNet, validKaInterval, callback, myIPv4, 12345, dstIPv4); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4126 | callback.expectError(PacketKeepalive.ERROR_HARDWARE_UNSUPPORTED); |
| 4127 | |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4128 | ka = mCm.startNattKeepalive(myNet, validKaInterval, callback, myIPv4, 12345, dstIPv4); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4129 | callback.expectError(PacketKeepalive.ERROR_HARDWARE_UNSUPPORTED); |
| 4130 | |
| 4131 | // Check that a started keepalive can be stopped. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4132 | mWiFiNetworkAgent.setStartKeepaliveEvent(PacketKeepalive.SUCCESS); |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4133 | ka = mCm.startNattKeepalive(myNet, validKaInterval, callback, myIPv4, 12345, dstIPv4); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4134 | callback.expectStarted(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4135 | mWiFiNetworkAgent.setStopKeepaliveEvent(PacketKeepalive.SUCCESS); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4136 | ka.stop(); |
| 4137 | callback.expectStopped(); |
| 4138 | |
| 4139 | // Check that deleting the IP address stops the keepalive. |
| 4140 | LinkProperties bogusLp = new LinkProperties(lp); |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4141 | ka = mCm.startNattKeepalive(myNet, validKaInterval, callback, myIPv4, 12345, dstIPv4); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4142 | callback.expectStarted(); |
| 4143 | bogusLp.removeLinkAddress(new LinkAddress(myIPv4, 25)); |
| 4144 | bogusLp.addLinkAddress(new LinkAddress(notMyIPv4, 25)); |
| 4145 | mWiFiNetworkAgent.sendLinkProperties(bogusLp); |
| 4146 | callback.expectError(PacketKeepalive.ERROR_INVALID_IP_ADDRESS); |
| 4147 | mWiFiNetworkAgent.sendLinkProperties(lp); |
| 4148 | |
| 4149 | // Check that a started keepalive is stopped correctly when the network disconnects. |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4150 | ka = mCm.startNattKeepalive(myNet, validKaInterval, callback, myIPv4, 12345, dstIPv4); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4151 | callback.expectStarted(); |
| 4152 | mWiFiNetworkAgent.disconnect(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4153 | mWiFiNetworkAgent.expectDisconnected(); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4154 | callback.expectError(PacketKeepalive.ERROR_INVALID_NETWORK); |
| 4155 | |
| 4156 | // ... and that stopping it after that has no adverse effects. |
Hugo Benichi | bb91c57 | 2017-05-22 10:44:02 +0900 | [diff] [blame] | 4157 | waitForIdle(); |
Hugo Benichi | dfb559a | 2016-12-20 14:57:49 +0900 | [diff] [blame] | 4158 | final Network myNetAlias = myNet; |
Lorenzo Colitti | 30145d7 | 2017-01-27 18:46:03 +0900 | [diff] [blame] | 4159 | assertNull(mCm.getNetworkCapabilities(myNetAlias)); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4160 | ka.stop(); |
| 4161 | |
| 4162 | // Reconnect. |
| 4163 | myNet = connectKeepaliveNetwork(lp); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4164 | mWiFiNetworkAgent.setStartKeepaliveEvent(PacketKeepalive.SUCCESS); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4165 | |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4166 | // Check that keepalive slots start from 1 and increment. The first one gets slot 1. |
| 4167 | mWiFiNetworkAgent.setExpectedKeepaliveSlot(1); |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4168 | ka = mCm.startNattKeepalive(myNet, validKaInterval, callback, myIPv4, 12345, dstIPv4); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4169 | callback.expectStarted(); |
| 4170 | |
| 4171 | // The second one gets slot 2. |
| 4172 | mWiFiNetworkAgent.setExpectedKeepaliveSlot(2); |
| 4173 | TestKeepaliveCallback callback2 = new TestKeepaliveCallback(); |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4174 | PacketKeepalive ka2 = mCm.startNattKeepalive( |
| 4175 | myNet, validKaInterval, callback2, myIPv4, 6789, dstIPv4); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4176 | callback2.expectStarted(); |
| 4177 | |
| 4178 | // Now stop the first one and create a third. This also gets slot 1. |
| 4179 | ka.stop(); |
| 4180 | callback.expectStopped(); |
| 4181 | |
| 4182 | mWiFiNetworkAgent.setExpectedKeepaliveSlot(1); |
| 4183 | TestKeepaliveCallback callback3 = new TestKeepaliveCallback(); |
Nathan Harold | 63dd813 | 2018-02-14 13:09:45 -0800 | [diff] [blame] | 4184 | PacketKeepalive ka3 = mCm.startNattKeepalive( |
| 4185 | myNet, validKaInterval, callback3, myIPv4, 9876, dstIPv4); |
Lorenzo Colitti | 7914ce5 | 2015-09-08 13:21:48 +0900 | [diff] [blame] | 4186 | callback3.expectStarted(); |
| 4187 | |
| 4188 | ka2.stop(); |
| 4189 | callback2.expectStopped(); |
| 4190 | |
| 4191 | ka3.stop(); |
| 4192 | callback3.expectStopped(); |
| 4193 | } |
Udam Saini | b7c2487 | 2016-01-04 12:16:14 -0800 | [diff] [blame] | 4194 | |
Xiao Ma | a463711 | 2019-02-07 15:03:57 +0900 | [diff] [blame] | 4195 | // Helper method to prepare the executor and run test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 4196 | private void runTestWithSerialExecutors(ExceptionUtils.ThrowingConsumer<Executor> functor) |
| 4197 | throws Exception { |
junyulai | 0683511 | 2019-01-03 18:50:15 +0800 | [diff] [blame] | 4198 | final ExecutorService executorSingleThread = Executors.newSingleThreadExecutor(); |
Xiao Ma | a463711 | 2019-02-07 15:03:57 +0900 | [diff] [blame] | 4199 | final Executor executorInline = (Runnable r) -> r.run(); |
| 4200 | functor.accept(executorSingleThread); |
junyulai | 0683511 | 2019-01-03 18:50:15 +0800 | [diff] [blame] | 4201 | executorSingleThread.shutdown(); |
Xiao Ma | a463711 | 2019-02-07 15:03:57 +0900 | [diff] [blame] | 4202 | functor.accept(executorInline); |
Remi NGUYEN VAN | ac02bc8 | 2019-02-08 17:10:50 +0900 | [diff] [blame] | 4203 | } |
junyulai | 0683511 | 2019-01-03 18:50:15 +0800 | [diff] [blame] | 4204 | |
Remi NGUYEN VAN | ac02bc8 | 2019-02-08 17:10:50 +0900 | [diff] [blame] | 4205 | @Test |
junyulai | afe9b49 | 2019-03-19 18:50:23 +0800 | [diff] [blame] | 4206 | public void testNattSocketKeepalives() throws Exception { |
| 4207 | runTestWithSerialExecutors(executor -> doTestNattSocketKeepalivesWithExecutor(executor)); |
| 4208 | runTestWithSerialExecutors(executor -> doTestNattSocketKeepalivesFdWithExecutor(executor)); |
junyulai | 0683511 | 2019-01-03 18:50:15 +0800 | [diff] [blame] | 4209 | } |
| 4210 | |
| 4211 | private void doTestNattSocketKeepalivesWithExecutor(Executor executor) throws Exception { |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4212 | // TODO: 1. Move this outside of ConnectivityServiceTest. |
junyulai | 0683511 | 2019-01-03 18:50:15 +0800 | [diff] [blame] | 4213 | // 2. Make test to verify that Nat-T keepalive socket is created by IpSecService. |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4214 | // 3. Mock ipsec service. |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4215 | final InetAddress myIPv4 = InetAddress.getByName("192.0.2.129"); |
| 4216 | final InetAddress notMyIPv4 = InetAddress.getByName("192.0.2.35"); |
| 4217 | final InetAddress myIPv6 = InetAddress.getByName("2001:db8::1"); |
| 4218 | final InetAddress dstIPv4 = InetAddress.getByName("8.8.8.8"); |
| 4219 | final InetAddress dstIPv6 = InetAddress.getByName("2001:4860:4860::8888"); |
| 4220 | |
| 4221 | final int validKaInterval = 15; |
| 4222 | final int invalidKaInterval = 9; |
| 4223 | |
| 4224 | final IpSecManager mIpSec = (IpSecManager) mContext.getSystemService(Context.IPSEC_SERVICE); |
junyulai | 1517815 | 2019-03-27 11:00:37 +0800 | [diff] [blame] | 4225 | final UdpEncapsulationSocket testSocket = mIpSec.openUdpEncapsulationSocket(); |
| 4226 | final int srcPort = testSocket.getPort(); |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4227 | |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4228 | LinkProperties lp = new LinkProperties(); |
| 4229 | lp.setInterfaceName("wlan12"); |
| 4230 | lp.addLinkAddress(new LinkAddress(myIPv6, 64)); |
| 4231 | lp.addLinkAddress(new LinkAddress(myIPv4, 25)); |
| 4232 | lp.addRoute(new RouteInfo(InetAddress.getByName("fe80::1234"))); |
| 4233 | lp.addRoute(new RouteInfo(InetAddress.getByName("192.0.2.254"))); |
| 4234 | |
| 4235 | Network notMyNet = new Network(61234); |
| 4236 | Network myNet = connectKeepaliveNetwork(lp); |
| 4237 | |
junyulai | 7c46917 | 2019-01-16 20:23:34 +0800 | [diff] [blame] | 4238 | TestSocketKeepaliveCallback callback = new TestSocketKeepaliveCallback(executor); |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4239 | |
| 4240 | // Attempt to start keepalives with invalid parameters and check for errors. |
| 4241 | // Invalid network. |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4242 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4243 | notMyNet, testSocket, myIPv4, dstIPv4, executor, callback)) { |
| 4244 | ka.start(validKaInterval); |
| 4245 | callback.expectError(SocketKeepalive.ERROR_INVALID_NETWORK); |
| 4246 | } |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4247 | |
| 4248 | // Invalid interval. |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4249 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4250 | myNet, testSocket, myIPv4, dstIPv4, executor, callback)) { |
| 4251 | ka.start(invalidKaInterval); |
| 4252 | callback.expectError(SocketKeepalive.ERROR_INVALID_INTERVAL); |
| 4253 | } |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4254 | |
| 4255 | // Invalid destination. |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4256 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4257 | myNet, testSocket, myIPv4, dstIPv6, executor, callback)) { |
| 4258 | ka.start(validKaInterval); |
| 4259 | callback.expectError(SocketKeepalive.ERROR_INVALID_IP_ADDRESS); |
| 4260 | } |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4261 | |
| 4262 | // Invalid source; |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4263 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4264 | myNet, testSocket, myIPv6, dstIPv4, executor, callback)) { |
| 4265 | ka.start(validKaInterval); |
| 4266 | callback.expectError(SocketKeepalive.ERROR_INVALID_IP_ADDRESS); |
| 4267 | } |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4268 | |
| 4269 | // NAT-T is only supported for IPv4. |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4270 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4271 | myNet, testSocket, myIPv6, dstIPv6, executor, callback)) { |
| 4272 | ka.start(validKaInterval); |
| 4273 | callback.expectError(SocketKeepalive.ERROR_INVALID_IP_ADDRESS); |
| 4274 | } |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4275 | |
| 4276 | // Sanity check before testing started keepalive. |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4277 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4278 | myNet, testSocket, myIPv4, dstIPv4, executor, callback)) { |
| 4279 | ka.start(validKaInterval); |
| 4280 | callback.expectError(SocketKeepalive.ERROR_UNSUPPORTED); |
| 4281 | } |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4282 | |
| 4283 | // Check that a started keepalive can be stopped. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4284 | mWiFiNetworkAgent.setStartKeepaliveEvent(SocketKeepalive.SUCCESS); |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4285 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4286 | myNet, testSocket, myIPv4, dstIPv4, executor, callback)) { |
| 4287 | ka.start(validKaInterval); |
| 4288 | callback.expectStarted(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4289 | mWiFiNetworkAgent.setStopKeepaliveEvent(SocketKeepalive.SUCCESS); |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4290 | ka.stop(); |
| 4291 | callback.expectStopped(); |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4292 | |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4293 | // Check that keepalive could be restarted. |
| 4294 | ka.start(validKaInterval); |
| 4295 | callback.expectStarted(); |
| 4296 | ka.stop(); |
| 4297 | callback.expectStopped(); |
junyulai | 7c46917 | 2019-01-16 20:23:34 +0800 | [diff] [blame] | 4298 | |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4299 | // Check that keepalive can be restarted without waiting for callback. |
| 4300 | ka.start(validKaInterval); |
| 4301 | callback.expectStarted(); |
| 4302 | ka.stop(); |
| 4303 | ka.start(validKaInterval); |
| 4304 | callback.expectStopped(); |
| 4305 | callback.expectStarted(); |
| 4306 | ka.stop(); |
| 4307 | callback.expectStopped(); |
| 4308 | } |
junyulai | 7c46917 | 2019-01-16 20:23:34 +0800 | [diff] [blame] | 4309 | |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4310 | // Check that deleting the IP address stops the keepalive. |
| 4311 | LinkProperties bogusLp = new LinkProperties(lp); |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4312 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4313 | myNet, testSocket, myIPv4, dstIPv4, executor, callback)) { |
| 4314 | ka.start(validKaInterval); |
| 4315 | callback.expectStarted(); |
| 4316 | bogusLp.removeLinkAddress(new LinkAddress(myIPv4, 25)); |
| 4317 | bogusLp.addLinkAddress(new LinkAddress(notMyIPv4, 25)); |
| 4318 | mWiFiNetworkAgent.sendLinkProperties(bogusLp); |
| 4319 | callback.expectError(SocketKeepalive.ERROR_INVALID_IP_ADDRESS); |
| 4320 | mWiFiNetworkAgent.sendLinkProperties(lp); |
| 4321 | } |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4322 | |
| 4323 | // Check that a started keepalive is stopped correctly when the network disconnects. |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4324 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4325 | myNet, testSocket, myIPv4, dstIPv4, executor, callback)) { |
| 4326 | ka.start(validKaInterval); |
| 4327 | callback.expectStarted(); |
| 4328 | mWiFiNetworkAgent.disconnect(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4329 | mWiFiNetworkAgent.expectDisconnected(); |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4330 | callback.expectError(SocketKeepalive.ERROR_INVALID_NETWORK); |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4331 | |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4332 | // ... and that stopping it after that has no adverse effects. |
| 4333 | waitForIdle(); |
| 4334 | final Network myNetAlias = myNet; |
| 4335 | assertNull(mCm.getNetworkCapabilities(myNetAlias)); |
| 4336 | ka.stop(); |
| 4337 | callback.assertNoCallback(); |
| 4338 | } |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4339 | |
| 4340 | // Reconnect. |
| 4341 | myNet = connectKeepaliveNetwork(lp); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4342 | mWiFiNetworkAgent.setStartKeepaliveEvent(SocketKeepalive.SUCCESS); |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4343 | |
| 4344 | // Check that keepalive slots start from 1 and increment. The first one gets slot 1. |
| 4345 | mWiFiNetworkAgent.setExpectedKeepaliveSlot(1); |
junyulai | 1517815 | 2019-03-27 11:00:37 +0800 | [diff] [blame] | 4346 | int srcPort2 = 0; |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4347 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4348 | myNet, testSocket, myIPv4, dstIPv4, executor, callback)) { |
| 4349 | ka.start(validKaInterval); |
| 4350 | callback.expectStarted(); |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4351 | |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4352 | // The second one gets slot 2. |
| 4353 | mWiFiNetworkAgent.setExpectedKeepaliveSlot(2); |
junyulai | 1517815 | 2019-03-27 11:00:37 +0800 | [diff] [blame] | 4354 | final UdpEncapsulationSocket testSocket2 = mIpSec.openUdpEncapsulationSocket(); |
| 4355 | srcPort2 = testSocket2.getPort(); |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4356 | TestSocketKeepaliveCallback callback2 = new TestSocketKeepaliveCallback(executor); |
| 4357 | try (SocketKeepalive ka2 = mCm.createSocketKeepalive( |
| 4358 | myNet, testSocket2, myIPv4, dstIPv4, executor, callback2)) { |
| 4359 | ka2.start(validKaInterval); |
| 4360 | callback2.expectStarted(); |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4361 | |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4362 | ka.stop(); |
| 4363 | callback.expectStopped(); |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4364 | |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4365 | ka2.stop(); |
| 4366 | callback2.expectStopped(); |
junyulai | 0683511 | 2019-01-03 18:50:15 +0800 | [diff] [blame] | 4367 | |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4368 | testSocket.close(); |
| 4369 | testSocket2.close(); |
| 4370 | } |
| 4371 | } |
junyulai | 0683511 | 2019-01-03 18:50:15 +0800 | [diff] [blame] | 4372 | |
junyulai | 1517815 | 2019-03-27 11:00:37 +0800 | [diff] [blame] | 4373 | // Check that there is no port leaked after all keepalives and sockets are closed. |
junyulai | 0535295 | 2019-04-09 14:37:35 +0800 | [diff] [blame] | 4374 | // TODO: enable this check after ensuring a valid free port. See b/129512753#comment7. |
| 4375 | // assertFalse(isUdpPortInUse(srcPort)); |
| 4376 | // assertFalse(isUdpPortInUse(srcPort2)); |
junyulai | 1517815 | 2019-03-27 11:00:37 +0800 | [diff] [blame] | 4377 | |
junyulai | 0683511 | 2019-01-03 18:50:15 +0800 | [diff] [blame] | 4378 | mWiFiNetworkAgent.disconnect(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4379 | mWiFiNetworkAgent.expectDisconnected(); |
Xiao Ma | a463711 | 2019-02-07 15:03:57 +0900 | [diff] [blame] | 4380 | mWiFiNetworkAgent = null; |
| 4381 | } |
| 4382 | |
| 4383 | @Test |
junyulai | afe9b49 | 2019-03-19 18:50:23 +0800 | [diff] [blame] | 4384 | public void testTcpSocketKeepalives() throws Exception { |
| 4385 | runTestWithSerialExecutors(executor -> doTestTcpSocketKeepalivesWithExecutor(executor)); |
Xiao Ma | a463711 | 2019-02-07 15:03:57 +0900 | [diff] [blame] | 4386 | } |
| 4387 | |
| 4388 | private void doTestTcpSocketKeepalivesWithExecutor(Executor executor) throws Exception { |
| 4389 | final int srcPortV4 = 12345; |
| 4390 | final int srcPortV6 = 23456; |
| 4391 | final InetAddress myIPv4 = InetAddress.getByName("127.0.0.1"); |
| 4392 | final InetAddress myIPv6 = InetAddress.getByName("::1"); |
| 4393 | |
| 4394 | final int validKaInterval = 15; |
Xiao Ma | a463711 | 2019-02-07 15:03:57 +0900 | [diff] [blame] | 4395 | |
| 4396 | final LinkProperties lp = new LinkProperties(); |
| 4397 | lp.setInterfaceName("wlan12"); |
| 4398 | lp.addLinkAddress(new LinkAddress(myIPv6, 64)); |
| 4399 | lp.addLinkAddress(new LinkAddress(myIPv4, 25)); |
| 4400 | lp.addRoute(new RouteInfo(InetAddress.getByName("fe80::1234"))); |
| 4401 | lp.addRoute(new RouteInfo(InetAddress.getByName("127.0.0.254"))); |
| 4402 | |
| 4403 | final Network notMyNet = new Network(61234); |
| 4404 | final Network myNet = connectKeepaliveNetwork(lp); |
| 4405 | |
| 4406 | final Socket testSocketV4 = new Socket(); |
| 4407 | final Socket testSocketV6 = new Socket(); |
| 4408 | |
junyulai | 7c46917 | 2019-01-16 20:23:34 +0800 | [diff] [blame] | 4409 | TestSocketKeepaliveCallback callback = new TestSocketKeepaliveCallback(executor); |
Xiao Ma | a463711 | 2019-02-07 15:03:57 +0900 | [diff] [blame] | 4410 | |
| 4411 | // Attempt to start Tcp keepalives with invalid parameters and check for errors. |
| 4412 | // Invalid network. |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4413 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4414 | notMyNet, testSocketV4, executor, callback)) { |
| 4415 | ka.start(validKaInterval); |
| 4416 | callback.expectError(SocketKeepalive.ERROR_INVALID_NETWORK); |
| 4417 | } |
Xiao Ma | a463711 | 2019-02-07 15:03:57 +0900 | [diff] [blame] | 4418 | |
| 4419 | // Invalid Socket (socket is not bound with IPv4 address). |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4420 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4421 | myNet, testSocketV4, executor, callback)) { |
| 4422 | ka.start(validKaInterval); |
| 4423 | callback.expectError(SocketKeepalive.ERROR_INVALID_SOCKET); |
| 4424 | } |
Xiao Ma | a463711 | 2019-02-07 15:03:57 +0900 | [diff] [blame] | 4425 | |
| 4426 | // Invalid Socket (socket is not bound with IPv6 address). |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4427 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4428 | myNet, testSocketV6, executor, callback)) { |
| 4429 | ka.start(validKaInterval); |
| 4430 | callback.expectError(SocketKeepalive.ERROR_INVALID_SOCKET); |
| 4431 | } |
Xiao Ma | a463711 | 2019-02-07 15:03:57 +0900 | [diff] [blame] | 4432 | |
| 4433 | // Bind the socket address |
| 4434 | testSocketV4.bind(new InetSocketAddress(myIPv4, srcPortV4)); |
| 4435 | testSocketV6.bind(new InetSocketAddress(myIPv6, srcPortV6)); |
| 4436 | |
| 4437 | // Invalid Socket (socket is bound with IPv4 address). |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4438 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4439 | myNet, testSocketV4, executor, callback)) { |
| 4440 | ka.start(validKaInterval); |
| 4441 | callback.expectError(SocketKeepalive.ERROR_INVALID_SOCKET); |
| 4442 | } |
Xiao Ma | a463711 | 2019-02-07 15:03:57 +0900 | [diff] [blame] | 4443 | |
| 4444 | // Invalid Socket (socket is bound with IPv6 address). |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4445 | try (SocketKeepalive ka = mCm.createSocketKeepalive( |
| 4446 | myNet, testSocketV6, executor, callback)) { |
| 4447 | ka.start(validKaInterval); |
| 4448 | callback.expectError(SocketKeepalive.ERROR_INVALID_SOCKET); |
| 4449 | } |
Xiao Ma | a463711 | 2019-02-07 15:03:57 +0900 | [diff] [blame] | 4450 | |
| 4451 | testSocketV4.close(); |
| 4452 | testSocketV6.close(); |
| 4453 | |
| 4454 | mWiFiNetworkAgent.disconnect(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4455 | mWiFiNetworkAgent.expectDisconnected(); |
Xiao Ma | a463711 | 2019-02-07 15:03:57 +0900 | [diff] [blame] | 4456 | mWiFiNetworkAgent = null; |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4457 | } |
| 4458 | |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4459 | private void doTestNattSocketKeepalivesFdWithExecutor(Executor executor) throws Exception { |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4460 | final InetAddress myIPv4 = InetAddress.getByName("192.0.2.129"); |
| 4461 | final InetAddress anyIPv4 = InetAddress.getByName("0.0.0.0"); |
| 4462 | final InetAddress dstIPv4 = InetAddress.getByName("8.8.8.8"); |
| 4463 | final int validKaInterval = 15; |
| 4464 | |
| 4465 | // Prepare the target network. |
| 4466 | LinkProperties lp = new LinkProperties(); |
| 4467 | lp.setInterfaceName("wlan12"); |
| 4468 | lp.addLinkAddress(new LinkAddress(myIPv4, 25)); |
| 4469 | lp.addRoute(new RouteInfo(InetAddress.getByName("192.0.2.254"))); |
| 4470 | Network myNet = connectKeepaliveNetwork(lp); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4471 | mWiFiNetworkAgent.setStartKeepaliveEvent(SocketKeepalive.SUCCESS); |
| 4472 | mWiFiNetworkAgent.setStopKeepaliveEvent(SocketKeepalive.SUCCESS); |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4473 | |
| 4474 | TestSocketKeepaliveCallback callback = new TestSocketKeepaliveCallback(executor); |
| 4475 | |
| 4476 | // Prepare the target file descriptor, keep only one instance. |
| 4477 | final IpSecManager mIpSec = (IpSecManager) mContext.getSystemService(Context.IPSEC_SERVICE); |
junyulai | 1517815 | 2019-03-27 11:00:37 +0800 | [diff] [blame] | 4478 | final UdpEncapsulationSocket testSocket = mIpSec.openUdpEncapsulationSocket(); |
| 4479 | final int srcPort = testSocket.getPort(); |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4480 | final ParcelFileDescriptor testPfd = |
| 4481 | ParcelFileDescriptor.dup(testSocket.getFileDescriptor()); |
| 4482 | testSocket.close(); |
| 4483 | assertTrue(isUdpPortInUse(srcPort)); |
| 4484 | |
| 4485 | // Start keepalive and explicit make the variable goes out of scope with try-with-resources |
| 4486 | // block. |
| 4487 | try (SocketKeepalive ka = mCm.createNattKeepalive( |
| 4488 | myNet, testPfd, myIPv4, dstIPv4, executor, callback)) { |
| 4489 | ka.start(validKaInterval); |
| 4490 | callback.expectStarted(); |
| 4491 | ka.stop(); |
| 4492 | callback.expectStopped(); |
| 4493 | } |
| 4494 | |
| 4495 | // Check that the ParcelFileDescriptor is still valid after keepalive stopped, |
| 4496 | // ErrnoException with EBADF will be thrown if the socket is closed when checking local |
| 4497 | // address. |
| 4498 | assertTrue(isUdpPortInUse(srcPort)); |
| 4499 | final InetSocketAddress sa = |
| 4500 | (InetSocketAddress) Os.getsockname(testPfd.getFileDescriptor()); |
| 4501 | assertEquals(anyIPv4, sa.getAddress()); |
| 4502 | |
| 4503 | testPfd.close(); |
junyulai | 0535295 | 2019-04-09 14:37:35 +0800 | [diff] [blame] | 4504 | // TODO: enable this check after ensuring a valid free port. See b/129512753#comment7. |
| 4505 | // assertFalse(isUdpPortInUse(srcPort)); |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4506 | |
| 4507 | mWiFiNetworkAgent.disconnect(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4508 | mWiFiNetworkAgent.expectDisconnected(); |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4509 | mWiFiNetworkAgent = null; |
| 4510 | } |
| 4511 | |
| 4512 | private static boolean isUdpPortInUse(int port) { |
| 4513 | try (DatagramSocket ignored = new DatagramSocket(port)) { |
| 4514 | return false; |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 4515 | } catch (IOException alreadyInUse) { |
junyulai | 0c66697 | 2019-03-04 22:45:36 +0800 | [diff] [blame] | 4516 | return true; |
| 4517 | } |
| 4518 | } |
| 4519 | |
junyulai | 48eac1d4 | 2018-12-27 17:25:29 +0800 | [diff] [blame] | 4520 | @Test |
Udam Saini | b7c2487 | 2016-01-04 12:16:14 -0800 | [diff] [blame] | 4521 | public void testGetCaptivePortalServerUrl() throws Exception { |
| 4522 | String url = mCm.getCaptivePortalServerUrl(); |
| 4523 | assertEquals("http://connectivitycheck.gstatic.com/generate_204", url); |
| 4524 | } |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 4525 | |
| 4526 | private static class TestNetworkPinner extends NetworkPinner { |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 4527 | public static boolean awaitPin(int timeoutMs) throws InterruptedException { |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 4528 | synchronized(sLock) { |
| 4529 | if (sNetwork == null) { |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 4530 | sLock.wait(timeoutMs); |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 4531 | } |
| 4532 | return sNetwork != null; |
| 4533 | } |
| 4534 | } |
| 4535 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 4536 | public static boolean awaitUnpin(int timeoutMs) throws InterruptedException { |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 4537 | synchronized(sLock) { |
| 4538 | if (sNetwork != null) { |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 4539 | sLock.wait(timeoutMs); |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 4540 | } |
| 4541 | return sNetwork == null; |
| 4542 | } |
| 4543 | } |
| 4544 | } |
| 4545 | |
| 4546 | private void assertPinnedToWifiWithCellDefault() { |
| 4547 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getBoundNetworkForProcess()); |
| 4548 | assertEquals(mCellNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 4549 | } |
| 4550 | |
| 4551 | private void assertPinnedToWifiWithWifiDefault() { |
| 4552 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getBoundNetworkForProcess()); |
| 4553 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 4554 | } |
| 4555 | |
| 4556 | private void assertNotPinnedToWifi() { |
| 4557 | assertNull(mCm.getBoundNetworkForProcess()); |
| 4558 | assertEquals(mCellNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 4559 | } |
| 4560 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 4561 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 4562 | public void testNetworkPinner() throws Exception { |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 4563 | NetworkRequest wifiRequest = new NetworkRequest.Builder() |
| 4564 | .addTransportType(TRANSPORT_WIFI) |
| 4565 | .build(); |
| 4566 | assertNull(mCm.getBoundNetworkForProcess()); |
| 4567 | |
| 4568 | TestNetworkPinner.pin(mServiceContext, wifiRequest); |
| 4569 | assertNull(mCm.getBoundNetworkForProcess()); |
| 4570 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4571 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 4572 | mCellNetworkAgent.connect(true); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4573 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 4574 | mWiFiNetworkAgent.connect(false); |
| 4575 | |
| 4576 | // When wi-fi connects, expect to be pinned. |
| 4577 | assertTrue(TestNetworkPinner.awaitPin(100)); |
| 4578 | assertPinnedToWifiWithCellDefault(); |
| 4579 | |
| 4580 | // Disconnect and expect the pin to drop. |
| 4581 | mWiFiNetworkAgent.disconnect(); |
| 4582 | assertTrue(TestNetworkPinner.awaitUnpin(100)); |
| 4583 | assertNotPinnedToWifi(); |
| 4584 | |
| 4585 | // Reconnecting does not cause the pin to come back. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4586 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 4587 | mWiFiNetworkAgent.connect(false); |
| 4588 | assertFalse(TestNetworkPinner.awaitPin(100)); |
| 4589 | assertNotPinnedToWifi(); |
| 4590 | |
| 4591 | // Pinning while connected causes the pin to take effect immediately. |
| 4592 | TestNetworkPinner.pin(mServiceContext, wifiRequest); |
| 4593 | assertTrue(TestNetworkPinner.awaitPin(100)); |
| 4594 | assertPinnedToWifiWithCellDefault(); |
| 4595 | |
| 4596 | // Explicitly unpin and expect to use the default network again. |
| 4597 | TestNetworkPinner.unpin(); |
| 4598 | assertNotPinnedToWifi(); |
| 4599 | |
| 4600 | // Disconnect cell and wifi. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 4601 | ExpectedBroadcast b = registerConnectivityBroadcast(3); // cell down, wifi up, wifi down. |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 4602 | mCellNetworkAgent.disconnect(); |
| 4603 | mWiFiNetworkAgent.disconnect(); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 4604 | b.expectBroadcast(); |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 4605 | |
| 4606 | // Pinning takes effect even if the pinned network is the default when the pin is set... |
| 4607 | TestNetworkPinner.pin(mServiceContext, wifiRequest); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4608 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 4609 | mWiFiNetworkAgent.connect(false); |
| 4610 | assertTrue(TestNetworkPinner.awaitPin(100)); |
| 4611 | assertPinnedToWifiWithWifiDefault(); |
| 4612 | |
| 4613 | // ... and is maintained even when that network is no longer the default. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 4614 | b = registerConnectivityBroadcast(1); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4615 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 4616 | mCellNetworkAgent.connect(true); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 4617 | b.expectBroadcast(); |
Lorenzo Colitti | 531a344 | 2016-03-01 12:55:58 +0900 | [diff] [blame] | 4618 | assertPinnedToWifiWithCellDefault(); |
| 4619 | } |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 4620 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 4621 | @Test |
Hugo Benichi | 893a762 | 2017-09-29 09:34:08 +0900 | [diff] [blame] | 4622 | public void testNetworkCallbackMaximum() { |
Jeff Sharkey | e0c2995 | 2018-02-20 17:24:55 -0700 | [diff] [blame] | 4623 | // We can only have 99 callbacks, because MultipathPolicyTracker is |
| 4624 | // already one of them. |
| 4625 | final int MAX_REQUESTS = 99; |
| 4626 | final int CALLBACKS = 89; |
Hugo Benichi | 893a762 | 2017-09-29 09:34:08 +0900 | [diff] [blame] | 4627 | final int INTENTS = 10; |
| 4628 | assertEquals(MAX_REQUESTS, CALLBACKS + INTENTS); |
| 4629 | |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 4630 | NetworkRequest networkRequest = new NetworkRequest.Builder().build(); |
Hugo Benichi | 893a762 | 2017-09-29 09:34:08 +0900 | [diff] [blame] | 4631 | ArrayList<Object> registered = new ArrayList<>(); |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 4632 | |
Hugo Benichi | 893a762 | 2017-09-29 09:34:08 +0900 | [diff] [blame] | 4633 | int j = 0; |
| 4634 | while (j++ < CALLBACKS / 2) { |
| 4635 | NetworkCallback cb = new NetworkCallback(); |
| 4636 | mCm.requestNetwork(networkRequest, cb); |
| 4637 | registered.add(cb); |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 4638 | } |
Hugo Benichi | 893a762 | 2017-09-29 09:34:08 +0900 | [diff] [blame] | 4639 | while (j++ < CALLBACKS) { |
| 4640 | NetworkCallback cb = new NetworkCallback(); |
| 4641 | mCm.registerNetworkCallback(networkRequest, cb); |
| 4642 | registered.add(cb); |
| 4643 | } |
| 4644 | j = 0; |
| 4645 | while (j++ < INTENTS / 2) { |
| 4646 | PendingIntent pi = PendingIntent.getBroadcast(mContext, 0, new Intent("a" + j), 0); |
| 4647 | mCm.requestNetwork(networkRequest, pi); |
| 4648 | registered.add(pi); |
| 4649 | } |
| 4650 | while (j++ < INTENTS) { |
| 4651 | PendingIntent pi = PendingIntent.getBroadcast(mContext, 0, new Intent("b" + j), 0); |
| 4652 | mCm.registerNetworkCallback(networkRequest, pi); |
| 4653 | registered.add(pi); |
| 4654 | } |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 4655 | |
Hugo Benichi | 893a762 | 2017-09-29 09:34:08 +0900 | [diff] [blame] | 4656 | // Test that the limit is enforced when MAX_REQUESTS simultaneous requests are added. |
Chalard Jean | 751bb3f | 2019-06-19 23:29:58 +0900 | [diff] [blame] | 4657 | assertThrows(TooManyRequestsException.class, () -> |
| 4658 | mCm.requestNetwork(networkRequest, new NetworkCallback()) |
| 4659 | ); |
| 4660 | assertThrows(TooManyRequestsException.class, () -> |
| 4661 | mCm.registerNetworkCallback(networkRequest, new NetworkCallback()) |
| 4662 | ); |
| 4663 | assertThrows(TooManyRequestsException.class, () -> |
| 4664 | mCm.requestNetwork(networkRequest, |
| 4665 | PendingIntent.getBroadcast(mContext, 0, new Intent("c"), 0)) |
| 4666 | ); |
| 4667 | assertThrows(TooManyRequestsException.class, () -> |
| 4668 | mCm.registerNetworkCallback(networkRequest, |
| 4669 | PendingIntent.getBroadcast(mContext, 0, new Intent("d"), 0)) |
| 4670 | ); |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 4671 | |
Hugo Benichi | 893a762 | 2017-09-29 09:34:08 +0900 | [diff] [blame] | 4672 | for (Object o : registered) { |
| 4673 | if (o instanceof NetworkCallback) { |
| 4674 | mCm.unregisterNetworkCallback((NetworkCallback)o); |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 4675 | } |
Hugo Benichi | 893a762 | 2017-09-29 09:34:08 +0900 | [diff] [blame] | 4676 | if (o instanceof PendingIntent) { |
| 4677 | mCm.unregisterNetworkCallback((PendingIntent)o); |
| 4678 | } |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 4679 | } |
Hugo Benichi | 893a762 | 2017-09-29 09:34:08 +0900 | [diff] [blame] | 4680 | waitForIdle(); |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 4681 | |
| 4682 | // Test that the limit is not hit when MAX_REQUESTS requests are added and removed. |
| 4683 | for (int i = 0; i < MAX_REQUESTS; i++) { |
| 4684 | NetworkCallback networkCallback = new NetworkCallback(); |
| 4685 | mCm.requestNetwork(networkRequest, networkCallback); |
| 4686 | mCm.unregisterNetworkCallback(networkCallback); |
| 4687 | } |
Hugo Benichi | 1e5039e | 2017-10-12 23:09:25 +0900 | [diff] [blame] | 4688 | waitForIdle(); |
Hugo Benichi | 893a762 | 2017-09-29 09:34:08 +0900 | [diff] [blame] | 4689 | |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 4690 | for (int i = 0; i < MAX_REQUESTS; i++) { |
| 4691 | NetworkCallback networkCallback = new NetworkCallback(); |
| 4692 | mCm.registerNetworkCallback(networkRequest, networkCallback); |
| 4693 | mCm.unregisterNetworkCallback(networkCallback); |
| 4694 | } |
Hugo Benichi | 1e5039e | 2017-10-12 23:09:25 +0900 | [diff] [blame] | 4695 | waitForIdle(); |
Hugo Benichi | 893a762 | 2017-09-29 09:34:08 +0900 | [diff] [blame] | 4696 | |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 4697 | for (int i = 0; i < MAX_REQUESTS; i++) { |
| 4698 | PendingIntent pendingIntent = |
Hugo Benichi | 893a762 | 2017-09-29 09:34:08 +0900 | [diff] [blame] | 4699 | PendingIntent.getBroadcast(mContext, 0, new Intent("e" + i), 0); |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 4700 | mCm.requestNetwork(networkRequest, pendingIntent); |
| 4701 | mCm.unregisterNetworkCallback(pendingIntent); |
| 4702 | } |
Hugo Benichi | 1e5039e | 2017-10-12 23:09:25 +0900 | [diff] [blame] | 4703 | waitForIdle(); |
Hugo Benichi | 893a762 | 2017-09-29 09:34:08 +0900 | [diff] [blame] | 4704 | |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 4705 | for (int i = 0; i < MAX_REQUESTS; i++) { |
| 4706 | PendingIntent pendingIntent = |
Hugo Benichi | 893a762 | 2017-09-29 09:34:08 +0900 | [diff] [blame] | 4707 | PendingIntent.getBroadcast(mContext, 0, new Intent("f" + i), 0); |
Paul Jensen | 4e1d3fd | 2016-04-08 13:56:52 -0400 | [diff] [blame] | 4708 | mCm.registerNetworkCallback(networkRequest, pendingIntent); |
| 4709 | mCm.unregisterNetworkCallback(pendingIntent); |
| 4710 | } |
| 4711 | } |
Hugo Benichi | fed512a | 2017-06-26 10:06:49 +0900 | [diff] [blame] | 4712 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 4713 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 4714 | public void testNetworkInfoOfTypeNone() throws Exception { |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 4715 | ExpectedBroadcast b = registerConnectivityBroadcast(1); |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 4716 | |
| 4717 | verifyNoNetwork(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4718 | TestNetworkAgentWrapper wifiAware = new TestNetworkAgentWrapper(TRANSPORT_WIFI_AWARE); |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 4719 | assertNull(mCm.getActiveNetworkInfo()); |
| 4720 | |
| 4721 | Network[] allNetworks = mCm.getAllNetworks(); |
| 4722 | assertLength(1, allNetworks); |
| 4723 | Network network = allNetworks[0]; |
| 4724 | NetworkCapabilities capabilities = mCm.getNetworkCapabilities(network); |
| 4725 | assertTrue(capabilities.hasTransport(TRANSPORT_WIFI_AWARE)); |
| 4726 | |
| 4727 | final NetworkRequest request = |
| 4728 | new NetworkRequest.Builder().addTransportType(TRANSPORT_WIFI_AWARE).build(); |
| 4729 | final TestNetworkCallback callback = new TestNetworkCallback(); |
| 4730 | mCm.registerNetworkCallback(request, callback); |
| 4731 | |
Hugo Benichi | c101450 | 2017-07-19 10:10:52 +0900 | [diff] [blame] | 4732 | // Bring up wifi aware network. |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 4733 | wifiAware.connect(false, false, false /* isStrictMode */); |
Lorenzo Colitti | 2733454 | 2018-01-12 16:22:21 +0900 | [diff] [blame] | 4734 | callback.expectAvailableCallbacksUnvalidated(wifiAware); |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 4735 | |
| 4736 | assertNull(mCm.getActiveNetworkInfo()); |
| 4737 | assertNull(mCm.getActiveNetwork()); |
Hugo Benichi | c101450 | 2017-07-19 10:10:52 +0900 | [diff] [blame] | 4738 | // TODO: getAllNetworkInfo is dirty and returns a non-empty array right from the start |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 4739 | // of this test. Fix it and uncomment the assert below. |
| 4740 | //assertEmpty(mCm.getAllNetworkInfo()); |
| 4741 | |
Hugo Benichi | c101450 | 2017-07-19 10:10:52 +0900 | [diff] [blame] | 4742 | // Disconnect wifi aware network. |
| 4743 | wifiAware.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 4744 | callback.expectCallbackThat(TIMEOUT_MS, (info) -> info instanceof CallbackEntry.Lost); |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 4745 | mCm.unregisterNetworkCallback(callback); |
| 4746 | |
| 4747 | verifyNoNetwork(); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 4748 | b.expectNoBroadcast(10); |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 4749 | } |
| 4750 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 4751 | @Test |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 4752 | public void testDeprecatedAndUnsupportedOperations() throws Exception { |
| 4753 | final int TYPE_NONE = ConnectivityManager.TYPE_NONE; |
| 4754 | assertNull(mCm.getNetworkInfo(TYPE_NONE)); |
| 4755 | assertNull(mCm.getNetworkForType(TYPE_NONE)); |
| 4756 | assertNull(mCm.getLinkProperties(TYPE_NONE)); |
| 4757 | assertFalse(mCm.isNetworkSupported(TYPE_NONE)); |
| 4758 | |
Chalard Jean | 9c0ff1b | 2019-05-30 17:11:14 +0900 | [diff] [blame] | 4759 | assertThrows(IllegalArgumentException.class, |
Chalard Jean | 3da8e0f | 2019-09-20 17:19:31 +0900 | [diff] [blame] | 4760 | () -> mCm.networkCapabilitiesForType(TYPE_NONE)); |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 4761 | |
| 4762 | Class<UnsupportedOperationException> unsupported = UnsupportedOperationException.class; |
Chalard Jean | 3da8e0f | 2019-09-20 17:19:31 +0900 | [diff] [blame] | 4763 | assertThrows(unsupported, () -> mCm.startUsingNetworkFeature(TYPE_WIFI, "")); |
| 4764 | assertThrows(unsupported, () -> mCm.stopUsingNetworkFeature(TYPE_WIFI, "")); |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 4765 | // TODO: let test context have configuration application target sdk version |
| 4766 | // and test that pre-M requesting for TYPE_NONE sends back APN_REQUEST_FAILED |
Chalard Jean | 3da8e0f | 2019-09-20 17:19:31 +0900 | [diff] [blame] | 4767 | assertThrows(unsupported, () -> mCm.startUsingNetworkFeature(TYPE_NONE, "")); |
| 4768 | assertThrows(unsupported, () -> mCm.stopUsingNetworkFeature(TYPE_NONE, "")); |
| 4769 | assertThrows(unsupported, () -> mCm.requestRouteToHostAddress(TYPE_NONE, null)); |
Hugo Benichi | 16f0a94 | 2017-06-20 14:07:59 +0900 | [diff] [blame] | 4770 | } |
| 4771 | |
Hugo Benichi | 4a0c5d7 | 2017-10-11 11:26:25 +0900 | [diff] [blame] | 4772 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 4773 | public void testLinkPropertiesEnsuresDirectlyConnectedRoutes() throws Exception { |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 4774 | final NetworkRequest networkRequest = new NetworkRequest.Builder() |
| 4775 | .addTransportType(TRANSPORT_WIFI).build(); |
| 4776 | final TestNetworkCallback networkCallback = new TestNetworkCallback(); |
| 4777 | mCm.registerNetworkCallback(networkRequest, networkCallback); |
| 4778 | |
| 4779 | LinkProperties lp = new LinkProperties(); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 4780 | lp.setInterfaceName(WIFI_IFNAME); |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 4781 | LinkAddress myIpv4Address = new LinkAddress("192.168.12.3/24"); |
| 4782 | RouteInfo myIpv4DefaultRoute = new RouteInfo((IpPrefix) null, |
| 4783 | NetworkUtils.numericToInetAddress("192.168.12.1"), lp.getInterfaceName()); |
| 4784 | lp.addLinkAddress(myIpv4Address); |
| 4785 | lp.addRoute(myIpv4DefaultRoute); |
| 4786 | |
| 4787 | // Verify direct routes are added when network agent is first registered in |
| 4788 | // ConnectivityService. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4789 | TestNetworkAgentWrapper networkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI, lp); |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 4790 | networkAgent.connect(true); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 4791 | networkCallback.expectCallback(CallbackEntry.AVAILABLE, networkAgent); |
| 4792 | networkCallback.expectCallback(CallbackEntry.NETWORK_CAPS_UPDATED, networkAgent); |
| 4793 | CallbackEntry.LinkPropertiesChanged cbi = |
| 4794 | networkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 4795 | networkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 4796 | networkCallback.expectCallback(CallbackEntry.BLOCKED_STATUS, networkAgent); |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 4797 | networkCallback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, networkAgent); |
| 4798 | networkCallback.assertNoCallback(); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 4799 | checkDirectlyConnectedRoutes(cbi.getLp(), Arrays.asList(myIpv4Address), |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 4800 | Arrays.asList(myIpv4DefaultRoute)); |
| 4801 | checkDirectlyConnectedRoutes(mCm.getLinkProperties(networkAgent.getNetwork()), |
| 4802 | Arrays.asList(myIpv4Address), Arrays.asList(myIpv4DefaultRoute)); |
| 4803 | |
| 4804 | // Verify direct routes are added during subsequent link properties updates. |
| 4805 | LinkProperties newLp = new LinkProperties(lp); |
| 4806 | LinkAddress myIpv6Address1 = new LinkAddress("fe80::cafe/64"); |
| 4807 | LinkAddress myIpv6Address2 = new LinkAddress("2001:db8::2/64"); |
| 4808 | newLp.addLinkAddress(myIpv6Address1); |
| 4809 | newLp.addLinkAddress(myIpv6Address2); |
| 4810 | networkAgent.sendLinkProperties(newLp); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 4811 | cbi = networkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, networkAgent); |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 4812 | networkCallback.assertNoCallback(); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 4813 | checkDirectlyConnectedRoutes(cbi.getLp(), |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 4814 | Arrays.asList(myIpv4Address, myIpv6Address1, myIpv6Address2), |
| 4815 | Arrays.asList(myIpv4DefaultRoute)); |
| 4816 | mCm.unregisterNetworkCallback(networkCallback); |
| 4817 | } |
| 4818 | |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 4819 | private <T> void assertSameElementsNoDuplicates(T[] expected, T[] actual) { |
| 4820 | // Easier to implement than a proper "assertSameElements" method that also correctly deals |
| 4821 | // with duplicates. |
| 4822 | final String msg = Arrays.toString(expected) + " != " + Arrays.toString(actual); |
| 4823 | assertEquals(msg, expected.length, actual.length); |
| 4824 | Set expectedSet = new ArraySet<>(Arrays.asList(expected)); |
| 4825 | assertEquals("expected contains duplicates", expectedSet.size(), expected.length); |
| 4826 | // actual cannot have duplicates because it's the same length and has the same elements. |
| 4827 | Set actualSet = new ArraySet<>(Arrays.asList(actual)); |
| 4828 | assertEquals(expectedSet, actualSet); |
| 4829 | } |
| 4830 | |
| 4831 | private void expectForceUpdateIfaces(Network[] networks, String defaultIface, |
| 4832 | Integer vpnUid, String vpnIfname, String[] underlyingIfaces) throws Exception { |
| 4833 | ArgumentCaptor<Network[]> networksCaptor = ArgumentCaptor.forClass(Network[].class); |
| 4834 | ArgumentCaptor<VpnInfo[]> vpnInfosCaptor = ArgumentCaptor.forClass(VpnInfo[].class); |
| 4835 | |
| 4836 | verify(mStatsService, atLeastOnce()).forceUpdateIfaces(networksCaptor.capture(), |
| 4837 | any(NetworkState[].class), eq(defaultIface), vpnInfosCaptor.capture()); |
| 4838 | |
| 4839 | assertSameElementsNoDuplicates(networksCaptor.getValue(), networks); |
| 4840 | |
| 4841 | VpnInfo[] infos = vpnInfosCaptor.getValue(); |
| 4842 | if (vpnUid != null) { |
| 4843 | assertEquals("Should have exactly one VPN:", 1, infos.length); |
| 4844 | VpnInfo info = infos[0]; |
| 4845 | assertEquals("Unexpected VPN owner:", (int) vpnUid, info.ownerUid); |
| 4846 | assertEquals("Unexpected VPN interface:", vpnIfname, info.vpnIface); |
| 4847 | assertSameElementsNoDuplicates(underlyingIfaces, info.underlyingIfaces); |
| 4848 | } else { |
| 4849 | assertEquals(0, infos.length); |
| 4850 | return; |
| 4851 | } |
| 4852 | } |
| 4853 | |
| 4854 | private void expectForceUpdateIfaces(Network[] networks, String defaultIface) throws Exception { |
| 4855 | expectForceUpdateIfaces(networks, defaultIface, null, null, new String[0]); |
| 4856 | } |
| 4857 | |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 4858 | @Test |
| 4859 | public void testStatsIfacesChanged() throws Exception { |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 4860 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
| 4861 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Lorenzo Colitti | c78da29 | 2018-01-19 00:50:48 +0900 | [diff] [blame] | 4862 | |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 4863 | final Network[] onlyCell = new Network[] {mCellNetworkAgent.getNetwork()}; |
| 4864 | final Network[] onlyWifi = new Network[] {mWiFiNetworkAgent.getNetwork()}; |
Varun Anand | d33cbc6 | 2019-02-07 14:13:13 -0800 | [diff] [blame] | 4865 | |
| 4866 | LinkProperties cellLp = new LinkProperties(); |
| 4867 | cellLp.setInterfaceName(MOBILE_IFNAME); |
| 4868 | LinkProperties wifiLp = new LinkProperties(); |
| 4869 | wifiLp.setInterfaceName(WIFI_IFNAME); |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 4870 | |
| 4871 | // Simple connection should have updated ifaces |
| 4872 | mCellNetworkAgent.connect(false); |
Varun Anand | d33cbc6 | 2019-02-07 14:13:13 -0800 | [diff] [blame] | 4873 | mCellNetworkAgent.sendLinkProperties(cellLp); |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 4874 | waitForIdle(); |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 4875 | expectForceUpdateIfaces(onlyCell, MOBILE_IFNAME); |
Lorenzo Colitti | c78da29 | 2018-01-19 00:50:48 +0900 | [diff] [blame] | 4876 | reset(mStatsService); |
| 4877 | |
| 4878 | // Default network switch should update ifaces. |
| 4879 | mWiFiNetworkAgent.connect(false); |
Varun Anand | d33cbc6 | 2019-02-07 14:13:13 -0800 | [diff] [blame] | 4880 | mWiFiNetworkAgent.sendLinkProperties(wifiLp); |
Lorenzo Colitti | c78da29 | 2018-01-19 00:50:48 +0900 | [diff] [blame] | 4881 | waitForIdle(); |
Varun Anand | d33cbc6 | 2019-02-07 14:13:13 -0800 | [diff] [blame] | 4882 | assertEquals(wifiLp, mService.getActiveLinkProperties()); |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 4883 | expectForceUpdateIfaces(onlyWifi, WIFI_IFNAME); |
Lorenzo Colitti | c78da29 | 2018-01-19 00:50:48 +0900 | [diff] [blame] | 4884 | reset(mStatsService); |
| 4885 | |
| 4886 | // Disconnect should update ifaces. |
| 4887 | mWiFiNetworkAgent.disconnect(); |
| 4888 | waitForIdle(); |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 4889 | expectForceUpdateIfaces(onlyCell, MOBILE_IFNAME); |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 4890 | reset(mStatsService); |
| 4891 | |
| 4892 | // Metered change should update ifaces |
| 4893 | mCellNetworkAgent.addCapability(NetworkCapabilities.NET_CAPABILITY_NOT_METERED); |
| 4894 | waitForIdle(); |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 4895 | expectForceUpdateIfaces(onlyCell, MOBILE_IFNAME); |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 4896 | reset(mStatsService); |
| 4897 | |
| 4898 | mCellNetworkAgent.removeCapability(NetworkCapabilities.NET_CAPABILITY_NOT_METERED); |
| 4899 | waitForIdle(); |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 4900 | expectForceUpdateIfaces(onlyCell, MOBILE_IFNAME); |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 4901 | reset(mStatsService); |
| 4902 | |
| 4903 | // Captive portal change shouldn't update ifaces |
| 4904 | mCellNetworkAgent.addCapability(NetworkCapabilities.NET_CAPABILITY_CAPTIVE_PORTAL); |
| 4905 | waitForIdle(); |
Varun Anand | d33cbc6 | 2019-02-07 14:13:13 -0800 | [diff] [blame] | 4906 | verify(mStatsService, never()) |
Lorenzo Colitti | 4aa8760 | 2019-06-24 13:50:45 +0900 | [diff] [blame] | 4907 | .forceUpdateIfaces(eq(onlyCell), any(NetworkState[].class), eq(MOBILE_IFNAME), |
| 4908 | eq(new VpnInfo[0])); |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 4909 | reset(mStatsService); |
| 4910 | |
| 4911 | // Roaming change should update ifaces |
| 4912 | mCellNetworkAgent.addCapability(NetworkCapabilities.NET_CAPABILITY_NOT_ROAMING); |
| 4913 | waitForIdle(); |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 4914 | expectForceUpdateIfaces(onlyCell, MOBILE_IFNAME); |
| 4915 | reset(mStatsService); |
| 4916 | |
| 4917 | // Test VPNs. |
| 4918 | final LinkProperties lp = new LinkProperties(); |
| 4919 | lp.setInterfaceName(VPN_IFNAME); |
| 4920 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 4921 | mMockVpn.establishForMyUid(lp); |
| 4922 | |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 4923 | final Network[] cellAndVpn = new Network[] { |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 4924 | mCellNetworkAgent.getNetwork(), mMockVpn.getNetwork()}; |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 4925 | |
| 4926 | // A VPN with default (null) underlying networks sets the underlying network's interfaces... |
| 4927 | expectForceUpdateIfaces(cellAndVpn, MOBILE_IFNAME, Process.myUid(), VPN_IFNAME, |
| 4928 | new String[]{MOBILE_IFNAME}); |
| 4929 | |
| 4930 | // ...and updates them as the default network switches. |
| 4931 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
| 4932 | mWiFiNetworkAgent.connect(false); |
| 4933 | mWiFiNetworkAgent.sendLinkProperties(wifiLp); |
Lorenzo Colitti | a3bdd1b | 2020-11-25 22:59:08 +0900 | [diff] [blame] | 4934 | final Network[] onlyNull = new Network[]{null}; |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 4935 | final Network[] wifiAndVpn = new Network[] { |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 4936 | mWiFiNetworkAgent.getNetwork(), mMockVpn.getNetwork()}; |
Lorenzo Colitti | a3bdd1b | 2020-11-25 22:59:08 +0900 | [diff] [blame] | 4937 | final Network[] cellAndWifi = new Network[] { |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 4938 | mCellNetworkAgent.getNetwork(), mWiFiNetworkAgent.getNetwork()}; |
Lorenzo Colitti | a3bdd1b | 2020-11-25 22:59:08 +0900 | [diff] [blame] | 4939 | final Network[] cellNullAndWifi = new Network[] { |
| 4940 | mCellNetworkAgent.getNetwork(), null, mWiFiNetworkAgent.getNetwork()}; |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 4941 | |
| 4942 | waitForIdle(); |
| 4943 | assertEquals(wifiLp, mService.getActiveLinkProperties()); |
| 4944 | expectForceUpdateIfaces(wifiAndVpn, WIFI_IFNAME, Process.myUid(), VPN_IFNAME, |
| 4945 | new String[]{WIFI_IFNAME}); |
| 4946 | reset(mStatsService); |
| 4947 | |
| 4948 | // A VPN that sets its underlying networks passes the underlying interfaces, and influences |
| 4949 | // the default interface sent to NetworkStatsService by virtue of applying to the system |
| 4950 | // server UID (or, in this test, to the test's UID). This is the reason for sending |
| 4951 | // MOBILE_IFNAME even though the default network is wifi. |
| 4952 | // TODO: fix this to pass in the actual default network interface. Whether or not the VPN |
| 4953 | // applies to the system server UID should not have any bearing on network stats. |
| 4954 | mService.setUnderlyingNetworksForVpn(onlyCell); |
| 4955 | waitForIdle(); |
| 4956 | expectForceUpdateIfaces(wifiAndVpn, MOBILE_IFNAME, Process.myUid(), VPN_IFNAME, |
| 4957 | new String[]{MOBILE_IFNAME}); |
| 4958 | reset(mStatsService); |
| 4959 | |
| 4960 | mService.setUnderlyingNetworksForVpn(cellAndWifi); |
| 4961 | waitForIdle(); |
| 4962 | expectForceUpdateIfaces(wifiAndVpn, MOBILE_IFNAME, Process.myUid(), VPN_IFNAME, |
| 4963 | new String[]{MOBILE_IFNAME, WIFI_IFNAME}); |
| 4964 | reset(mStatsService); |
| 4965 | |
Lorenzo Colitti | a3bdd1b | 2020-11-25 22:59:08 +0900 | [diff] [blame] | 4966 | // Null underlying networks are ignored. |
| 4967 | mService.setUnderlyingNetworksForVpn(cellNullAndWifi); |
| 4968 | waitForIdle(); |
| 4969 | expectForceUpdateIfaces(wifiAndVpn, MOBILE_IFNAME, Process.myUid(), VPN_IFNAME, |
| 4970 | new String[]{MOBILE_IFNAME, WIFI_IFNAME}); |
| 4971 | reset(mStatsService); |
| 4972 | |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 4973 | // If an underlying network disconnects, that interface should no longer be underlying. |
| 4974 | // This doesn't actually work because disconnectAndDestroyNetwork only notifies |
| 4975 | // NetworkStatsService before the underlying network is actually removed. So the underlying |
| 4976 | // network will only be removed if notifyIfacesChangedForNetworkStats is called again. This |
| 4977 | // could result in incorrect data usage measurements if the interface used by the |
| 4978 | // disconnected network is reused by a system component that does not register an agent for |
| 4979 | // it (e.g., tethering). |
| 4980 | mCellNetworkAgent.disconnect(); |
| 4981 | waitForIdle(); |
| 4982 | assertNull(mService.getLinkProperties(mCellNetworkAgent.getNetwork())); |
| 4983 | expectForceUpdateIfaces(wifiAndVpn, MOBILE_IFNAME, Process.myUid(), VPN_IFNAME, |
| 4984 | new String[]{MOBILE_IFNAME, WIFI_IFNAME}); |
| 4985 | |
| 4986 | // Confirm that we never tell NetworkStatsService that cell is no longer the underlying |
| 4987 | // network for the VPN... |
| 4988 | verify(mStatsService, never()).forceUpdateIfaces(any(Network[].class), |
| 4989 | any(NetworkState[].class), any() /* anyString() doesn't match null */, |
| 4990 | argThat(infos -> infos[0].underlyingIfaces.length == 1 |
| 4991 | && WIFI_IFNAME.equals(infos[0].underlyingIfaces[0]))); |
| 4992 | verifyNoMoreInteractions(mStatsService); |
| 4993 | reset(mStatsService); |
| 4994 | |
| 4995 | // ... but if something else happens that causes notifyIfacesChangedForNetworkStats to be |
| 4996 | // called again, it does. For example, connect Ethernet, but with a low score, such that it |
| 4997 | // does not become the default network. |
| 4998 | mEthernetNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_ETHERNET); |
| 4999 | mEthernetNetworkAgent.adjustScore(-40); |
| 5000 | mEthernetNetworkAgent.connect(false); |
| 5001 | waitForIdle(); |
| 5002 | verify(mStatsService).forceUpdateIfaces(any(Network[].class), |
| 5003 | any(NetworkState[].class), any() /* anyString() doesn't match null */, |
| 5004 | argThat(vpnInfos -> vpnInfos[0].underlyingIfaces.length == 1 |
| 5005 | && WIFI_IFNAME.equals(vpnInfos[0].underlyingIfaces[0]))); |
| 5006 | mEthernetNetworkAgent.disconnect(); |
Lorenzo Colitti | a3bdd1b | 2020-11-25 22:59:08 +0900 | [diff] [blame] | 5007 | waitForIdle(); |
Lorenzo Colitti | 66f3d4b | 2020-11-17 23:23:58 +0900 | [diff] [blame] | 5008 | reset(mStatsService); |
| 5009 | |
| 5010 | // When a VPN declares no underlying networks (i.e., no connectivity), getAllVpnInfo |
| 5011 | // does not return the VPN, so CS does not pass it to NetworkStatsService. This causes |
| 5012 | // NetworkStatsFactory#adjustForTunAnd464Xlat not to attempt any VPN data migration, which |
| 5013 | // is probably a performance improvement (though it's very unlikely that a VPN would declare |
| 5014 | // no underlying networks). |
| 5015 | // Also, for the same reason as above, the active interface passed in is null. |
| 5016 | mService.setUnderlyingNetworksForVpn(new Network[0]); |
| 5017 | waitForIdle(); |
| 5018 | expectForceUpdateIfaces(wifiAndVpn, null); |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 5019 | reset(mStatsService); |
Lorenzo Colitti | a3bdd1b | 2020-11-25 22:59:08 +0900 | [diff] [blame] | 5020 | |
| 5021 | // Specifying only a null underlying network is the same as no networks. |
| 5022 | mService.setUnderlyingNetworksForVpn(onlyNull); |
| 5023 | waitForIdle(); |
| 5024 | expectForceUpdateIfaces(wifiAndVpn, null); |
| 5025 | reset(mStatsService); |
| 5026 | |
| 5027 | // Specifying networks that are all disconnected is the same as specifying no networks. |
| 5028 | mService.setUnderlyingNetworksForVpn(onlyCell); |
| 5029 | waitForIdle(); |
| 5030 | expectForceUpdateIfaces(wifiAndVpn, null); |
| 5031 | reset(mStatsService); |
Jeff Sharkey | 72f9c42 | 2017-10-27 17:22:59 -0600 | [diff] [blame] | 5032 | } |
| 5033 | |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 5034 | @Test |
| 5035 | public void testBasicDnsConfigurationPushed() throws Exception { |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5036 | setPrivateDnsSettings(PRIVATE_DNS_MODE_OPPORTUNISTIC, "ignored.example.com"); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5037 | |
| 5038 | // Clear any interactions that occur as a result of CS starting up. |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5039 | reset(mMockDnsResolver); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5040 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 5041 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 5042 | waitForIdle(); |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 5043 | verify(mMockDnsResolver, never()).setResolverConfiguration(any()); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5044 | verifyNoMoreInteractions(mMockDnsResolver); |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 5045 | |
| 5046 | final LinkProperties cellLp = new LinkProperties(); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5047 | cellLp.setInterfaceName(MOBILE_IFNAME); |
Erik Kline | 117e7f3 | 2018-03-04 21:01:01 +0900 | [diff] [blame] | 5048 | // Add IPv4 and IPv6 default routes, because DNS-over-TLS code does |
| 5049 | // "is-reachable" testing in order to not program netd with unreachable |
| 5050 | // nameservers that it might try repeated to validate. |
| 5051 | cellLp.addLinkAddress(new LinkAddress("192.0.2.4/24")); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5052 | cellLp.addRoute(new RouteInfo((IpPrefix) null, InetAddress.getByName("192.0.2.4"), |
| 5053 | MOBILE_IFNAME)); |
Erik Kline | 117e7f3 | 2018-03-04 21:01:01 +0900 | [diff] [blame] | 5054 | cellLp.addLinkAddress(new LinkAddress("2001:db8:1::1/64")); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5055 | cellLp.addRoute(new RouteInfo((IpPrefix) null, InetAddress.getByName("2001:db8:1::1"), |
| 5056 | MOBILE_IFNAME)); |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 5057 | mCellNetworkAgent.sendLinkProperties(cellLp); |
| 5058 | mCellNetworkAgent.connect(false); |
| 5059 | waitForIdle(); |
Luke Huang | a24d5d8 | 2019-04-09 18:41:49 +0800 | [diff] [blame] | 5060 | |
| 5061 | verify(mMockDnsResolver, times(1)).createNetworkCache( |
| 5062 | eq(mCellNetworkAgent.getNetwork().netId)); |
| 5063 | // CS tells dnsresolver about the empty DNS config for this network. |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 5064 | verify(mMockDnsResolver, atLeastOnce()).setResolverConfiguration(any()); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5065 | reset(mMockDnsResolver); |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 5066 | |
| 5067 | cellLp.addDnsServer(InetAddress.getByName("2001:db8::1")); |
| 5068 | mCellNetworkAgent.sendLinkProperties(cellLp); |
| 5069 | waitForIdle(); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5070 | verify(mMockDnsResolver, atLeastOnce()).setResolverConfiguration( |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 5071 | mResolverParamsParcelCaptor.capture()); |
| 5072 | ResolverParamsParcel resolvrParams = mResolverParamsParcelCaptor.getValue(); |
| 5073 | assertEquals(1, resolvrParams.servers.length); |
| 5074 | assertTrue(ArrayUtils.contains(resolvrParams.servers, "2001:db8::1")); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5075 | // Opportunistic mode. |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 5076 | assertTrue(ArrayUtils.contains(resolvrParams.tlsServers, "2001:db8::1")); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5077 | reset(mMockDnsResolver); |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 5078 | |
| 5079 | cellLp.addDnsServer(InetAddress.getByName("192.0.2.1")); |
| 5080 | mCellNetworkAgent.sendLinkProperties(cellLp); |
| 5081 | waitForIdle(); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5082 | verify(mMockDnsResolver, atLeastOnce()).setResolverConfiguration( |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 5083 | mResolverParamsParcelCaptor.capture()); |
| 5084 | resolvrParams = mResolverParamsParcelCaptor.getValue(); |
| 5085 | assertEquals(2, resolvrParams.servers.length); |
| 5086 | assertTrue(ArrayUtils.containsAll(resolvrParams.servers, |
Erik Kline | 117e7f3 | 2018-03-04 21:01:01 +0900 | [diff] [blame] | 5087 | new String[]{"2001:db8::1", "192.0.2.1"})); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5088 | // Opportunistic mode. |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 5089 | assertEquals(2, resolvrParams.tlsServers.length); |
| 5090 | assertTrue(ArrayUtils.containsAll(resolvrParams.tlsServers, |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5091 | new String[]{"2001:db8::1", "192.0.2.1"})); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5092 | reset(mMockDnsResolver); |
Erik Kline | 117e7f3 | 2018-03-04 21:01:01 +0900 | [diff] [blame] | 5093 | |
| 5094 | final String TLS_SPECIFIER = "tls.example.com"; |
| 5095 | final String TLS_SERVER6 = "2001:db8:53::53"; |
| 5096 | final InetAddress[] TLS_IPS = new InetAddress[]{ InetAddress.getByName(TLS_SERVER6) }; |
| 5097 | final String[] TLS_SERVERS = new String[]{ TLS_SERVER6 }; |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 5098 | mCellNetworkAgent.mNmCallbacks.notifyPrivateDnsConfigResolved( |
| 5099 | new PrivateDnsConfig(TLS_SPECIFIER, TLS_IPS).toParcel()); |
| 5100 | |
Erik Kline | 117e7f3 | 2018-03-04 21:01:01 +0900 | [diff] [blame] | 5101 | waitForIdle(); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5102 | verify(mMockDnsResolver, atLeastOnce()).setResolverConfiguration( |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 5103 | mResolverParamsParcelCaptor.capture()); |
| 5104 | resolvrParams = mResolverParamsParcelCaptor.getValue(); |
| 5105 | assertEquals(2, resolvrParams.servers.length); |
| 5106 | assertTrue(ArrayUtils.containsAll(resolvrParams.servers, |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 5107 | new String[]{"2001:db8::1", "192.0.2.1"})); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5108 | reset(mMockDnsResolver); |
Erik Kline | e89953b | 2018-01-11 16:11:10 +0900 | [diff] [blame] | 5109 | } |
| 5110 | |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5111 | @Test |
chenbruce | 5d95562 | 2020-02-20 14:28:31 +0800 | [diff] [blame] | 5112 | public void testDnsConfigurationTransTypesPushed() throws Exception { |
| 5113 | // Clear any interactions that occur as a result of CS starting up. |
| 5114 | reset(mMockDnsResolver); |
| 5115 | |
| 5116 | final NetworkRequest request = new NetworkRequest.Builder() |
| 5117 | .clearCapabilities().addCapability(NET_CAPABILITY_INTERNET) |
| 5118 | .build(); |
| 5119 | final TestNetworkCallback callback = new TestNetworkCallback(); |
| 5120 | mCm.registerNetworkCallback(request, callback); |
| 5121 | |
| 5122 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
| 5123 | mWiFiNetworkAgent.connect(false); |
| 5124 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
| 5125 | verify(mMockDnsResolver, times(1)).createNetworkCache( |
| 5126 | eq(mWiFiNetworkAgent.getNetwork().netId)); |
| 5127 | verify(mMockDnsResolver, times(2)).setResolverConfiguration( |
| 5128 | mResolverParamsParcelCaptor.capture()); |
| 5129 | final ResolverParamsParcel resolverParams = mResolverParamsParcelCaptor.getValue(); |
| 5130 | assertContainsExactly(resolverParams.transportTypes, TRANSPORT_WIFI); |
| 5131 | reset(mMockDnsResolver); |
| 5132 | } |
| 5133 | |
| 5134 | @Test |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 5135 | public void testPrivateDnsNotification() throws Exception { |
| 5136 | NetworkRequest request = new NetworkRequest.Builder() |
| 5137 | .clearCapabilities().addCapability(NET_CAPABILITY_INTERNET) |
| 5138 | .build(); |
| 5139 | TestNetworkCallback callback = new TestNetworkCallback(); |
| 5140 | mCm.registerNetworkCallback(request, callback); |
| 5141 | // Bring up wifi. |
| 5142 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
| 5143 | mWiFiNetworkAgent.connect(false); |
| 5144 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
| 5145 | // Private DNS resolution failed, checking if the notification will be shown or not. |
| 5146 | mWiFiNetworkAgent.setNetworkInvalid(true /* isStrictMode */); |
| 5147 | mWiFiNetworkAgent.mNetworkMonitor.forceReevaluation(Process.myUid()); |
| 5148 | waitForIdle(); |
| 5149 | // If network validation failed, NetworkMonitor will re-evaluate the network. |
| 5150 | // ConnectivityService should filter the redundant notification. This part is trying to |
| 5151 | // simulate that situation and check if ConnectivityService could filter that case. |
| 5152 | mWiFiNetworkAgent.mNetworkMonitor.forceReevaluation(Process.myUid()); |
| 5153 | waitForIdle(); |
| 5154 | verify(mNotificationManager, timeout(TIMEOUT_MS).times(1)).notifyAsUser(anyString(), |
| 5155 | eq(NotificationType.PRIVATE_DNS_BROKEN.eventId), any(), eq(UserHandle.ALL)); |
| 5156 | // If private DNS resolution successful, the PRIVATE_DNS_BROKEN notification shouldn't be |
| 5157 | // shown. |
| 5158 | mWiFiNetworkAgent.setNetworkValid(true /* isStrictMode */); |
| 5159 | mWiFiNetworkAgent.mNetworkMonitor.forceReevaluation(Process.myUid()); |
| 5160 | waitForIdle(); |
| 5161 | verify(mNotificationManager, timeout(TIMEOUT_MS).times(1)).cancelAsUser(anyString(), |
| 5162 | eq(NotificationType.PRIVATE_DNS_BROKEN.eventId), eq(UserHandle.ALL)); |
| 5163 | // If private DNS resolution failed again, the PRIVATE_DNS_BROKEN notification should be |
| 5164 | // shown again. |
| 5165 | mWiFiNetworkAgent.setNetworkInvalid(true /* isStrictMode */); |
| 5166 | mWiFiNetworkAgent.mNetworkMonitor.forceReevaluation(Process.myUid()); |
| 5167 | waitForIdle(); |
| 5168 | verify(mNotificationManager, timeout(TIMEOUT_MS).times(2)).notifyAsUser(anyString(), |
| 5169 | eq(NotificationType.PRIVATE_DNS_BROKEN.eventId), any(), eq(UserHandle.ALL)); |
| 5170 | } |
| 5171 | |
| 5172 | @Test |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5173 | public void testPrivateDnsSettingsChange() throws Exception { |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5174 | // Clear any interactions that occur as a result of CS starting up. |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5175 | reset(mMockDnsResolver); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5176 | |
| 5177 | // The default on Android is opportunistic mode ("Automatic"). |
| 5178 | setPrivateDnsSettings(PRIVATE_DNS_MODE_OPPORTUNISTIC, "ignored.example.com"); |
| 5179 | |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5180 | final TestNetworkCallback cellNetworkCallback = new TestNetworkCallback(); |
| 5181 | final NetworkRequest cellRequest = new NetworkRequest.Builder() |
| 5182 | .addTransportType(TRANSPORT_CELLULAR).build(); |
| 5183 | mCm.requestNetwork(cellRequest, cellNetworkCallback); |
| 5184 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 5185 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5186 | waitForIdle(); |
| 5187 | // CS tells netd about the empty DNS config for this network. |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 5188 | verify(mMockDnsResolver, never()).setResolverConfiguration(any()); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5189 | verifyNoMoreInteractions(mMockDnsResolver); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5190 | |
| 5191 | final LinkProperties cellLp = new LinkProperties(); |
| 5192 | cellLp.setInterfaceName(MOBILE_IFNAME); |
| 5193 | // Add IPv4 and IPv6 default routes, because DNS-over-TLS code does |
| 5194 | // "is-reachable" testing in order to not program netd with unreachable |
| 5195 | // nameservers that it might try repeated to validate. |
| 5196 | cellLp.addLinkAddress(new LinkAddress("192.0.2.4/24")); |
| 5197 | cellLp.addRoute(new RouteInfo((IpPrefix) null, InetAddress.getByName("192.0.2.4"), |
| 5198 | MOBILE_IFNAME)); |
| 5199 | cellLp.addLinkAddress(new LinkAddress("2001:db8:1::1/64")); |
| 5200 | cellLp.addRoute(new RouteInfo((IpPrefix) null, InetAddress.getByName("2001:db8:1::1"), |
| 5201 | MOBILE_IFNAME)); |
| 5202 | cellLp.addDnsServer(InetAddress.getByName("2001:db8::1")); |
| 5203 | cellLp.addDnsServer(InetAddress.getByName("192.0.2.1")); |
| 5204 | |
| 5205 | mCellNetworkAgent.sendLinkProperties(cellLp); |
| 5206 | mCellNetworkAgent.connect(false); |
| 5207 | waitForIdle(); |
Luke Huang | a24d5d8 | 2019-04-09 18:41:49 +0800 | [diff] [blame] | 5208 | verify(mMockDnsResolver, times(1)).createNetworkCache( |
| 5209 | eq(mCellNetworkAgent.getNetwork().netId)); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5210 | verify(mMockDnsResolver, atLeastOnce()).setResolverConfiguration( |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 5211 | mResolverParamsParcelCaptor.capture()); |
| 5212 | ResolverParamsParcel resolvrParams = mResolverParamsParcelCaptor.getValue(); |
| 5213 | assertEquals(2, resolvrParams.tlsServers.length); |
| 5214 | assertTrue(ArrayUtils.containsAll(resolvrParams.tlsServers, |
Chalard Jean | 9c0ff1b | 2019-05-30 17:11:14 +0900 | [diff] [blame] | 5215 | new String[] { "2001:db8::1", "192.0.2.1" })); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5216 | // Opportunistic mode. |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 5217 | assertEquals(2, resolvrParams.tlsServers.length); |
| 5218 | assertTrue(ArrayUtils.containsAll(resolvrParams.tlsServers, |
Chalard Jean | 9c0ff1b | 2019-05-30 17:11:14 +0900 | [diff] [blame] | 5219 | new String[] { "2001:db8::1", "192.0.2.1" })); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5220 | reset(mMockDnsResolver); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 5221 | cellNetworkCallback.expectCallback(CallbackEntry.AVAILABLE, mCellNetworkAgent); |
| 5222 | cellNetworkCallback.expectCallback(CallbackEntry.NETWORK_CAPS_UPDATED, |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5223 | mCellNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 5224 | CallbackEntry.LinkPropertiesChanged cbi = cellNetworkCallback.expectCallback( |
| 5225 | CallbackEntry.LINK_PROPERTIES_CHANGED, mCellNetworkAgent); |
| 5226 | cellNetworkCallback.expectCallback(CallbackEntry.BLOCKED_STATUS, mCellNetworkAgent); |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5227 | cellNetworkCallback.assertNoCallback(); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5228 | assertFalse(cbi.getLp().isPrivateDnsActive()); |
| 5229 | assertNull(cbi.getLp().getPrivateDnsServerName()); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5230 | |
| 5231 | setPrivateDnsSettings(PRIVATE_DNS_MODE_OFF, "ignored.example.com"); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5232 | verify(mMockDnsResolver, times(1)).setResolverConfiguration( |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 5233 | mResolverParamsParcelCaptor.capture()); |
| 5234 | resolvrParams = mResolverParamsParcelCaptor.getValue(); |
| 5235 | assertEquals(2, resolvrParams.servers.length); |
| 5236 | assertTrue(ArrayUtils.containsAll(resolvrParams.servers, |
Chalard Jean | 9c0ff1b | 2019-05-30 17:11:14 +0900 | [diff] [blame] | 5237 | new String[] { "2001:db8::1", "192.0.2.1" })); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5238 | reset(mMockDnsResolver); |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5239 | cellNetworkCallback.assertNoCallback(); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5240 | |
| 5241 | setPrivateDnsSettings(PRIVATE_DNS_MODE_OPPORTUNISTIC, "ignored.example.com"); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5242 | verify(mMockDnsResolver, atLeastOnce()).setResolverConfiguration( |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 5243 | mResolverParamsParcelCaptor.capture()); |
| 5244 | resolvrParams = mResolverParamsParcelCaptor.getValue(); |
| 5245 | assertEquals(2, resolvrParams.servers.length); |
| 5246 | assertTrue(ArrayUtils.containsAll(resolvrParams.servers, |
Chalard Jean | 9c0ff1b | 2019-05-30 17:11:14 +0900 | [diff] [blame] | 5247 | new String[] { "2001:db8::1", "192.0.2.1" })); |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 5248 | assertEquals(2, resolvrParams.tlsServers.length); |
| 5249 | assertTrue(ArrayUtils.containsAll(resolvrParams.tlsServers, |
Chalard Jean | 9c0ff1b | 2019-05-30 17:11:14 +0900 | [diff] [blame] | 5250 | new String[] { "2001:db8::1", "192.0.2.1" })); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 5251 | reset(mMockDnsResolver); |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5252 | cellNetworkCallback.assertNoCallback(); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5253 | |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5254 | setPrivateDnsSettings(PRIVATE_DNS_MODE_PROVIDER_HOSTNAME, "strict.example.com"); |
| 5255 | // Can't test dns configuration for strict mode without properly mocking |
| 5256 | // out the DNS lookups, but can test that LinkProperties is updated. |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 5257 | cbi = cellNetworkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5258 | mCellNetworkAgent); |
| 5259 | cellNetworkCallback.assertNoCallback(); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5260 | assertTrue(cbi.getLp().isPrivateDnsActive()); |
| 5261 | assertEquals("strict.example.com", cbi.getLp().getPrivateDnsServerName()); |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5262 | } |
| 5263 | |
| 5264 | @Test |
| 5265 | public void testLinkPropertiesWithPrivateDnsValidationEvents() throws Exception { |
| 5266 | // The default on Android is opportunistic mode ("Automatic"). |
| 5267 | setPrivateDnsSettings(PRIVATE_DNS_MODE_OPPORTUNISTIC, "ignored.example.com"); |
| 5268 | |
| 5269 | final TestNetworkCallback cellNetworkCallback = new TestNetworkCallback(); |
| 5270 | final NetworkRequest cellRequest = new NetworkRequest.Builder() |
| 5271 | .addTransportType(TRANSPORT_CELLULAR).build(); |
| 5272 | mCm.requestNetwork(cellRequest, cellNetworkCallback); |
| 5273 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 5274 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5275 | waitForIdle(); |
| 5276 | LinkProperties lp = new LinkProperties(); |
| 5277 | mCellNetworkAgent.sendLinkProperties(lp); |
| 5278 | mCellNetworkAgent.connect(false); |
| 5279 | waitForIdle(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 5280 | cellNetworkCallback.expectCallback(CallbackEntry.AVAILABLE, mCellNetworkAgent); |
| 5281 | cellNetworkCallback.expectCallback(CallbackEntry.NETWORK_CAPS_UPDATED, |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5282 | mCellNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 5283 | CallbackEntry.LinkPropertiesChanged cbi = cellNetworkCallback.expectCallback( |
| 5284 | CallbackEntry.LINK_PROPERTIES_CHANGED, mCellNetworkAgent); |
| 5285 | cellNetworkCallback.expectCallback(CallbackEntry.BLOCKED_STATUS, mCellNetworkAgent); |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5286 | cellNetworkCallback.assertNoCallback(); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5287 | assertFalse(cbi.getLp().isPrivateDnsActive()); |
| 5288 | assertNull(cbi.getLp().getPrivateDnsServerName()); |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5289 | Set<InetAddress> dnsServers = new HashSet<>(); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5290 | checkDnsServers(cbi.getLp(), dnsServers); |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5291 | |
| 5292 | // Send a validation event for a server that is not part of the current |
| 5293 | // resolver config. The validation event should be ignored. |
| 5294 | mService.mNetdEventCallback.onPrivateDnsValidationEvent( |
| 5295 | mCellNetworkAgent.getNetwork().netId, "", "145.100.185.18", true); |
| 5296 | cellNetworkCallback.assertNoCallback(); |
| 5297 | |
| 5298 | // Add a dns server to the LinkProperties. |
| 5299 | LinkProperties lp2 = new LinkProperties(lp); |
| 5300 | lp2.addDnsServer(InetAddress.getByName("145.100.185.16")); |
| 5301 | mCellNetworkAgent.sendLinkProperties(lp2); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 5302 | cbi = cellNetworkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5303 | mCellNetworkAgent); |
| 5304 | cellNetworkCallback.assertNoCallback(); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5305 | assertFalse(cbi.getLp().isPrivateDnsActive()); |
| 5306 | assertNull(cbi.getLp().getPrivateDnsServerName()); |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5307 | dnsServers.add(InetAddress.getByName("145.100.185.16")); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5308 | checkDnsServers(cbi.getLp(), dnsServers); |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5309 | |
| 5310 | // Send a validation event containing a hostname that is not part of |
| 5311 | // the current resolver config. The validation event should be ignored. |
| 5312 | mService.mNetdEventCallback.onPrivateDnsValidationEvent( |
| 5313 | mCellNetworkAgent.getNetwork().netId, "145.100.185.16", "hostname", true); |
| 5314 | cellNetworkCallback.assertNoCallback(); |
| 5315 | |
| 5316 | // Send a validation event where validation failed. |
| 5317 | mService.mNetdEventCallback.onPrivateDnsValidationEvent( |
| 5318 | mCellNetworkAgent.getNetwork().netId, "145.100.185.16", "", false); |
| 5319 | cellNetworkCallback.assertNoCallback(); |
| 5320 | |
| 5321 | // Send a validation event where validation succeeded for a server in |
| 5322 | // the current resolver config. A LinkProperties callback with updated |
| 5323 | // private dns fields should be sent. |
| 5324 | mService.mNetdEventCallback.onPrivateDnsValidationEvent( |
| 5325 | mCellNetworkAgent.getNetwork().netId, "145.100.185.16", "", true); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 5326 | cbi = cellNetworkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5327 | mCellNetworkAgent); |
| 5328 | cellNetworkCallback.assertNoCallback(); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5329 | assertTrue(cbi.getLp().isPrivateDnsActive()); |
| 5330 | assertNull(cbi.getLp().getPrivateDnsServerName()); |
| 5331 | checkDnsServers(cbi.getLp(), dnsServers); |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5332 | |
| 5333 | // The private dns fields in LinkProperties should be preserved when |
| 5334 | // the network agent sends unrelated changes. |
| 5335 | LinkProperties lp3 = new LinkProperties(lp2); |
| 5336 | lp3.setMtu(1300); |
| 5337 | mCellNetworkAgent.sendLinkProperties(lp3); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 5338 | cbi = cellNetworkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5339 | mCellNetworkAgent); |
| 5340 | cellNetworkCallback.assertNoCallback(); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5341 | assertTrue(cbi.getLp().isPrivateDnsActive()); |
| 5342 | assertNull(cbi.getLp().getPrivateDnsServerName()); |
| 5343 | checkDnsServers(cbi.getLp(), dnsServers); |
| 5344 | assertEquals(1300, cbi.getLp().getMtu()); |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5345 | |
| 5346 | // Removing the only validated server should affect the private dns |
| 5347 | // fields in LinkProperties. |
| 5348 | LinkProperties lp4 = new LinkProperties(lp3); |
| 5349 | lp4.removeDnsServer(InetAddress.getByName("145.100.185.16")); |
| 5350 | mCellNetworkAgent.sendLinkProperties(lp4); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 5351 | cbi = cellNetworkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5352 | mCellNetworkAgent); |
| 5353 | cellNetworkCallback.assertNoCallback(); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5354 | assertFalse(cbi.getLp().isPrivateDnsActive()); |
| 5355 | assertNull(cbi.getLp().getPrivateDnsServerName()); |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5356 | dnsServers.remove(InetAddress.getByName("145.100.185.16")); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5357 | checkDnsServers(cbi.getLp(), dnsServers); |
| 5358 | assertEquals(1300, cbi.getLp().getMtu()); |
Erik Kline | 79c6d05 | 2018-03-21 07:18:33 -0700 | [diff] [blame] | 5359 | } |
| 5360 | |
Rubin Xu | 1bb5c08 | 2017-09-05 18:40:49 +0100 | [diff] [blame] | 5361 | private void checkDirectlyConnectedRoutes(Object callbackObj, |
| 5362 | Collection<LinkAddress> linkAddresses, Collection<RouteInfo> otherRoutes) { |
| 5363 | assertTrue(callbackObj instanceof LinkProperties); |
| 5364 | LinkProperties lp = (LinkProperties) callbackObj; |
| 5365 | |
| 5366 | Set<RouteInfo> expectedRoutes = new ArraySet<>(); |
| 5367 | expectedRoutes.addAll(otherRoutes); |
| 5368 | for (LinkAddress address : linkAddresses) { |
| 5369 | RouteInfo localRoute = new RouteInfo(address, null, lp.getInterfaceName()); |
| 5370 | // Duplicates in linkAddresses are considered failures |
| 5371 | assertTrue(expectedRoutes.add(localRoute)); |
| 5372 | } |
| 5373 | List<RouteInfo> observedRoutes = lp.getRoutes(); |
| 5374 | assertEquals(expectedRoutes.size(), observedRoutes.size()); |
| 5375 | assertTrue(observedRoutes.containsAll(expectedRoutes)); |
| 5376 | } |
| 5377 | |
dalyk | 1fcb739 | 2018-03-05 12:42:22 -0500 | [diff] [blame] | 5378 | private static void checkDnsServers(Object callbackObj, Set<InetAddress> dnsServers) { |
| 5379 | assertTrue(callbackObj instanceof LinkProperties); |
| 5380 | LinkProperties lp = (LinkProperties) callbackObj; |
| 5381 | assertEquals(dnsServers.size(), lp.getDnsServers().size()); |
| 5382 | assertTrue(lp.getDnsServers().containsAll(dnsServers)); |
| 5383 | } |
| 5384 | |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5385 | @Test |
Lorenzo Colitti | 590e296 | 2020-11-16 10:11:12 +0900 | [diff] [blame] | 5386 | public void testVpnConnectDisconnectUnderlyingNetwork() throws Exception { |
| 5387 | final TestNetworkCallback callback = new TestNetworkCallback(); |
| 5388 | final NetworkRequest request = new NetworkRequest.Builder() |
| 5389 | .removeCapability(NET_CAPABILITY_NOT_VPN).build(); |
| 5390 | |
| 5391 | mCm.registerNetworkCallback(request, callback); |
| 5392 | |
| 5393 | // Bring up a VPN that specifies an underlying network that does not exist yet. |
| 5394 | // Note: it's sort of meaningless for a VPN app to declare a network that doesn't exist yet, |
| 5395 | // (and doing so is difficult without using reflection) but it's good to test that the code |
| 5396 | // behaves approximately correctly. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5397 | mMockVpn.establishForMyUid(false, true, false); |
Lorenzo Colitti | 590e296 | 2020-11-16 10:11:12 +0900 | [diff] [blame] | 5398 | final Network wifiNetwork = new Network(mNetIdManager.peekNextNetId()); |
Lorenzo Colitti | a2e6363 | 2020-11-16 16:05:44 +0900 | [diff] [blame] | 5399 | mService.setUnderlyingNetworksForVpn(new Network[]{wifiNetwork}); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5400 | callback.expectAvailableCallbacksUnvalidated(mMockVpn); |
| 5401 | assertTrue(mCm.getNetworkCapabilities(mMockVpn.getNetwork()) |
Lorenzo Colitti | 590e296 | 2020-11-16 10:11:12 +0900 | [diff] [blame] | 5402 | .hasTransport(TRANSPORT_VPN)); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5403 | assertFalse(mCm.getNetworkCapabilities(mMockVpn.getNetwork()) |
Lorenzo Colitti | 590e296 | 2020-11-16 10:11:12 +0900 | [diff] [blame] | 5404 | .hasTransport(TRANSPORT_WIFI)); |
| 5405 | |
| 5406 | // Make that underlying network connect, and expect to see its capabilities immediately |
| 5407 | // reflected in the VPN's capabilities. |
| 5408 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
| 5409 | assertEquals(wifiNetwork, mWiFiNetworkAgent.getNetwork()); |
| 5410 | mWiFiNetworkAgent.connect(false); |
Lorenzo Colitti | a2e6363 | 2020-11-16 16:05:44 +0900 | [diff] [blame] | 5411 | // TODO: the callback for the VPN happens before any callbacks are called for the wifi |
| 5412 | // network that has just connected. There appear to be two issues here: |
| 5413 | // 1. The VPN code will accept an underlying network as soon as getNetworkCapabilities() for |
| 5414 | // it returns non-null (which happens very early, during handleRegisterNetworkAgent). |
| 5415 | // This is not correct because that that point the network is not connected and cannot |
| 5416 | // pass any traffic. |
| 5417 | // 2. When a network connects, updateNetworkInfo propagates underlying network capabilities |
| 5418 | // before rematching networks. |
| 5419 | // Given that this scenario can't really happen, this is probably fine for now. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5420 | callback.expectCallback(CallbackEntry.NETWORK_CAPS_UPDATED, mMockVpn); |
Lorenzo Colitti | a2e6363 | 2020-11-16 16:05:44 +0900 | [diff] [blame] | 5421 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5422 | assertTrue(mCm.getNetworkCapabilities(mMockVpn.getNetwork()) |
Lorenzo Colitti | 590e296 | 2020-11-16 10:11:12 +0900 | [diff] [blame] | 5423 | .hasTransport(TRANSPORT_VPN)); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5424 | assertTrue(mCm.getNetworkCapabilities(mMockVpn.getNetwork()) |
Lorenzo Colitti | 590e296 | 2020-11-16 10:11:12 +0900 | [diff] [blame] | 5425 | .hasTransport(TRANSPORT_WIFI)); |
| 5426 | |
| 5427 | // Disconnect the network, and expect to see the VPN capabilities change accordingly. |
| 5428 | mWiFiNetworkAgent.disconnect(); |
| 5429 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5430 | callback.expectCapabilitiesThat(mMockVpn, (nc) -> |
Lorenzo Colitti | 590e296 | 2020-11-16 10:11:12 +0900 | [diff] [blame] | 5431 | nc.getTransportTypes().length == 1 && nc.hasTransport(TRANSPORT_VPN)); |
| 5432 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5433 | mMockVpn.disconnect(); |
Lorenzo Colitti | 590e296 | 2020-11-16 10:11:12 +0900 | [diff] [blame] | 5434 | mCm.unregisterNetworkCallback(callback); |
| 5435 | } |
| 5436 | |
Lorenzo Colitti | d31ccb1 | 2021-01-07 23:33:18 +0900 | [diff] [blame] | 5437 | private void assertGetNetworkInfoOfGetActiveNetworkIsConnected(boolean expectedConnectivity) { |
| 5438 | // What Chromium used to do before https://chromium-review.googlesource.com/2605304 |
| 5439 | assertEquals("Unexpected result for getActiveNetworkInfo(getActiveNetwork())", |
| 5440 | expectedConnectivity, mCm.getNetworkInfo(mCm.getActiveNetwork()).isConnected()); |
| 5441 | } |
| 5442 | |
| 5443 | @Test |
| 5444 | public void testVpnUnderlyingNetworkSuspended() throws Exception { |
| 5445 | final TestNetworkCallback callback = new TestNetworkCallback(); |
| 5446 | mCm.registerDefaultNetworkCallback(callback); |
| 5447 | |
| 5448 | // Connect a VPN. |
| 5449 | mMockVpn.establishForMyUid(false, true, false); |
| 5450 | callback.expectAvailableCallbacksUnvalidated(mMockVpn); |
| 5451 | |
| 5452 | // Connect cellular data. |
| 5453 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
| 5454 | mCellNetworkAgent.connect(false /* validated */); |
| 5455 | callback.expectCapabilitiesThat(mMockVpn, |
| 5456 | nc -> nc.hasCapability(NET_CAPABILITY_NOT_SUSPENDED) |
| 5457 | && nc.hasTransport(TRANSPORT_CELLULAR)); |
| 5458 | callback.assertNoCallback(); |
| 5459 | |
| 5460 | assertTrue(mCm.getNetworkCapabilities(mMockVpn.getNetwork()) |
| 5461 | .hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
| 5462 | assertNetworkInfo(TYPE_MOBILE, DetailedState.CONNECTED); |
| 5463 | assertNetworkInfo(TYPE_WIFI, DetailedState.DISCONNECTED); |
| 5464 | assertNetworkInfo(TYPE_VPN, DetailedState.CONNECTED); |
| 5465 | assertActiveNetworkInfo(TYPE_MOBILE, DetailedState.CONNECTED); |
| 5466 | assertGetNetworkInfoOfGetActiveNetworkIsConnected(true); |
| 5467 | |
| 5468 | // Suspend the cellular network and expect the VPN to be suspended. |
| 5469 | mCellNetworkAgent.suspend(); |
| 5470 | callback.expectCapabilitiesThat(mMockVpn, |
| 5471 | nc -> !nc.hasCapability(NET_CAPABILITY_NOT_SUSPENDED) |
| 5472 | && nc.hasTransport(TRANSPORT_CELLULAR)); |
| 5473 | callback.expectCallback(CallbackEntry.SUSPENDED, mMockVpn); |
| 5474 | callback.assertNoCallback(); |
| 5475 | |
| 5476 | assertFalse(mCm.getNetworkCapabilities(mMockVpn.getNetwork()) |
| 5477 | .hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
| 5478 | assertNetworkInfo(TYPE_MOBILE, DetailedState.SUSPENDED); |
| 5479 | assertNetworkInfo(TYPE_WIFI, DetailedState.DISCONNECTED); |
| 5480 | assertNetworkInfo(TYPE_VPN, DetailedState.SUSPENDED); |
| 5481 | assertActiveNetworkInfo(TYPE_MOBILE, DetailedState.SUSPENDED); |
| 5482 | // VPN's main underlying network is suspended, so no connectivity. |
| 5483 | assertGetNetworkInfoOfGetActiveNetworkIsConnected(false); |
| 5484 | |
| 5485 | // Switch to another network. The VPN should no longer be suspended. |
| 5486 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
| 5487 | mWiFiNetworkAgent.connect(false /* validated */); |
| 5488 | callback.expectCapabilitiesThat(mMockVpn, |
| 5489 | nc -> nc.hasCapability(NET_CAPABILITY_NOT_SUSPENDED) |
| 5490 | && nc.hasTransport(TRANSPORT_WIFI)); |
Lorenzo Colitti | b9a8d8e | 2021-01-11 22:27:57 +0900 | [diff] [blame^] | 5491 | callback.expectCallback(CallbackEntry.RESUMED, mMockVpn); |
Lorenzo Colitti | d31ccb1 | 2021-01-07 23:33:18 +0900 | [diff] [blame] | 5492 | callback.assertNoCallback(); |
| 5493 | |
| 5494 | assertTrue(mCm.getNetworkCapabilities(mMockVpn.getNetwork()) |
| 5495 | .hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
| 5496 | assertNetworkInfo(TYPE_MOBILE, DetailedState.DISCONNECTED); |
| 5497 | assertNetworkInfo(TYPE_WIFI, DetailedState.CONNECTED); |
Lorenzo Colitti | b9a8d8e | 2021-01-11 22:27:57 +0900 | [diff] [blame^] | 5498 | assertNetworkInfo(TYPE_VPN, DetailedState.CONNECTED); |
Lorenzo Colitti | d31ccb1 | 2021-01-07 23:33:18 +0900 | [diff] [blame] | 5499 | assertActiveNetworkInfo(TYPE_WIFI, DetailedState.CONNECTED); |
Lorenzo Colitti | b9a8d8e | 2021-01-11 22:27:57 +0900 | [diff] [blame^] | 5500 | assertGetNetworkInfoOfGetActiveNetworkIsConnected(true); |
Lorenzo Colitti | d31ccb1 | 2021-01-07 23:33:18 +0900 | [diff] [blame] | 5501 | |
Lorenzo Colitti | b9a8d8e | 2021-01-11 22:27:57 +0900 | [diff] [blame^] | 5502 | // Unsuspend cellular and then switch back to it. The VPN remains not suspended. |
Lorenzo Colitti | d31ccb1 | 2021-01-07 23:33:18 +0900 | [diff] [blame] | 5503 | mCellNetworkAgent.resume(); |
| 5504 | mWiFiNetworkAgent.disconnect(); |
| 5505 | callback.expectCapabilitiesThat(mMockVpn, |
| 5506 | nc -> nc.hasCapability(NET_CAPABILITY_NOT_SUSPENDED) |
| 5507 | && nc.hasTransport(TRANSPORT_CELLULAR)); |
| 5508 | // Spurious double callback? |
| 5509 | callback.expectCapabilitiesThat(mMockVpn, |
| 5510 | nc -> nc.hasCapability(NET_CAPABILITY_NOT_SUSPENDED) |
| 5511 | && nc.hasTransport(TRANSPORT_CELLULAR)); |
| 5512 | callback.assertNoCallback(); |
| 5513 | |
| 5514 | assertTrue(mCm.getNetworkCapabilities(mMockVpn.getNetwork()) |
| 5515 | .hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
| 5516 | assertNetworkInfo(TYPE_MOBILE, DetailedState.CONNECTED); |
| 5517 | assertNetworkInfo(TYPE_WIFI, DetailedState.DISCONNECTED); |
Lorenzo Colitti | b9a8d8e | 2021-01-11 22:27:57 +0900 | [diff] [blame^] | 5518 | assertNetworkInfo(TYPE_VPN, DetailedState.CONNECTED); |
Lorenzo Colitti | 7825bc9 | 2021-01-12 00:34:44 +0900 | [diff] [blame] | 5519 | assertActiveNetworkInfo(TYPE_MOBILE, DetailedState.CONNECTED); |
Lorenzo Colitti | b9a8d8e | 2021-01-11 22:27:57 +0900 | [diff] [blame^] | 5520 | assertGetNetworkInfoOfGetActiveNetworkIsConnected(true); |
Lorenzo Colitti | d31ccb1 | 2021-01-07 23:33:18 +0900 | [diff] [blame] | 5521 | |
Lorenzo Colitti | b9a8d8e | 2021-01-11 22:27:57 +0900 | [diff] [blame^] | 5522 | // Suspend cellular and expect no connectivity. |
Lorenzo Colitti | d31ccb1 | 2021-01-07 23:33:18 +0900 | [diff] [blame] | 5523 | mCellNetworkAgent.suspend(); |
Lorenzo Colitti | 7825bc9 | 2021-01-12 00:34:44 +0900 | [diff] [blame] | 5524 | callback.expectCapabilitiesThat(mMockVpn, |
| 5525 | nc -> !nc.hasCapability(NET_CAPABILITY_NOT_SUSPENDED) |
| 5526 | && nc.hasTransport(TRANSPORT_CELLULAR)); |
| 5527 | callback.expectCallback(CallbackEntry.SUSPENDED, mMockVpn); |
| 5528 | callback.assertNoCallback(); |
Lorenzo Colitti | d31ccb1 | 2021-01-07 23:33:18 +0900 | [diff] [blame] | 5529 | |
Lorenzo Colitti | 7825bc9 | 2021-01-12 00:34:44 +0900 | [diff] [blame] | 5530 | assertFalse(mCm.getNetworkCapabilities(mMockVpn.getNetwork()) |
| 5531 | .hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
Lorenzo Colitti | d31ccb1 | 2021-01-07 23:33:18 +0900 | [diff] [blame] | 5532 | assertNetworkInfo(TYPE_MOBILE, DetailedState.SUSPENDED); |
| 5533 | assertNetworkInfo(TYPE_WIFI, DetailedState.DISCONNECTED); |
| 5534 | assertNetworkInfo(TYPE_VPN, DetailedState.SUSPENDED); |
Lorenzo Colitti | 7825bc9 | 2021-01-12 00:34:44 +0900 | [diff] [blame] | 5535 | assertActiveNetworkInfo(TYPE_MOBILE, DetailedState.SUSPENDED); |
Lorenzo Colitti | d31ccb1 | 2021-01-07 23:33:18 +0900 | [diff] [blame] | 5536 | assertGetNetworkInfoOfGetActiveNetworkIsConnected(false); |
| 5537 | |
Lorenzo Colitti | b9a8d8e | 2021-01-11 22:27:57 +0900 | [diff] [blame^] | 5538 | // Resume cellular and expect that connectivity comes back. |
Lorenzo Colitti | d31ccb1 | 2021-01-07 23:33:18 +0900 | [diff] [blame] | 5539 | mCellNetworkAgent.resume(); |
Lorenzo Colitti | 7825bc9 | 2021-01-12 00:34:44 +0900 | [diff] [blame] | 5540 | callback.expectCapabilitiesThat(mMockVpn, |
| 5541 | nc -> nc.hasCapability(NET_CAPABILITY_NOT_SUSPENDED) |
| 5542 | && nc.hasTransport(TRANSPORT_CELLULAR)); |
| 5543 | callback.expectCallback(CallbackEntry.RESUMED, mMockVpn); |
| 5544 | callback.assertNoCallback(); |
Lorenzo Colitti | d31ccb1 | 2021-01-07 23:33:18 +0900 | [diff] [blame] | 5545 | |
| 5546 | assertTrue(mCm.getNetworkCapabilities(mMockVpn.getNetwork()) |
| 5547 | .hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
| 5548 | assertNetworkInfo(TYPE_MOBILE, DetailedState.CONNECTED); |
| 5549 | assertNetworkInfo(TYPE_WIFI, DetailedState.DISCONNECTED); |
Lorenzo Colitti | 7825bc9 | 2021-01-12 00:34:44 +0900 | [diff] [blame] | 5550 | assertNetworkInfo(TYPE_VPN, DetailedState.CONNECTED); |
| 5551 | assertActiveNetworkInfo(TYPE_MOBILE, DetailedState.CONNECTED); |
| 5552 | assertGetNetworkInfoOfGetActiveNetworkIsConnected(true); |
Lorenzo Colitti | d31ccb1 | 2021-01-07 23:33:18 +0900 | [diff] [blame] | 5553 | } |
| 5554 | |
Lorenzo Colitti | 590e296 | 2020-11-16 10:11:12 +0900 | [diff] [blame] | 5555 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 5556 | public void testVpnNetworkActive() throws Exception { |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5557 | final int uid = Process.myUid(); |
| 5558 | |
| 5559 | final TestNetworkCallback genericNetworkCallback = new TestNetworkCallback(); |
Chalard Jean | b552c46 | 2018-02-21 18:43:54 +0900 | [diff] [blame] | 5560 | final TestNetworkCallback genericNotVpnNetworkCallback = new TestNetworkCallback(); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5561 | final TestNetworkCallback wifiNetworkCallback = new TestNetworkCallback(); |
| 5562 | final TestNetworkCallback vpnNetworkCallback = new TestNetworkCallback(); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 5563 | final TestNetworkCallback defaultCallback = new TestNetworkCallback(); |
Chalard Jean | b552c46 | 2018-02-21 18:43:54 +0900 | [diff] [blame] | 5564 | final NetworkRequest genericNotVpnRequest = new NetworkRequest.Builder().build(); |
| 5565 | final NetworkRequest genericRequest = new NetworkRequest.Builder() |
| 5566 | .removeCapability(NET_CAPABILITY_NOT_VPN).build(); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5567 | final NetworkRequest wifiRequest = new NetworkRequest.Builder() |
| 5568 | .addTransportType(TRANSPORT_WIFI).build(); |
| 5569 | final NetworkRequest vpnNetworkRequest = new NetworkRequest.Builder() |
Chalard Jean | b552c46 | 2018-02-21 18:43:54 +0900 | [diff] [blame] | 5570 | .removeCapability(NET_CAPABILITY_NOT_VPN) |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5571 | .addTransportType(TRANSPORT_VPN).build(); |
| 5572 | mCm.registerNetworkCallback(genericRequest, genericNetworkCallback); |
Chalard Jean | b552c46 | 2018-02-21 18:43:54 +0900 | [diff] [blame] | 5573 | mCm.registerNetworkCallback(genericNotVpnRequest, genericNotVpnNetworkCallback); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5574 | mCm.registerNetworkCallback(wifiRequest, wifiNetworkCallback); |
| 5575 | mCm.registerNetworkCallback(vpnNetworkRequest, vpnNetworkCallback); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 5576 | mCm.registerDefaultNetworkCallback(defaultCallback); |
| 5577 | defaultCallback.assertNoCallback(); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5578 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 5579 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5580 | mWiFiNetworkAgent.connect(false); |
| 5581 | |
| 5582 | genericNetworkCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chalard Jean | b552c46 | 2018-02-21 18:43:54 +0900 | [diff] [blame] | 5583 | genericNotVpnNetworkCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5584 | wifiNetworkCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 5585 | defaultCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5586 | vpnNetworkCallback.assertNoCallback(); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 5587 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5588 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5589 | final Set<UidRange> ranges = uidRangesForUid(uid); |
| 5590 | mMockVpn.registerAgent(ranges); |
Lorenzo Colitti | 515b6d8 | 2020-11-19 23:20:55 +0900 | [diff] [blame] | 5591 | mService.setUnderlyingNetworksForVpn(new Network[0]); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5592 | |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 5593 | // VPN networks do not satisfy the default request and are automatically validated |
| 5594 | // by NetworkMonitor |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 5595 | assertFalse(NetworkMonitorUtils.isValidationRequired( |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5596 | mMockVpn.getAgent().getNetworkCapabilities())); |
| 5597 | mMockVpn.getAgent().setNetworkValid(false /* isStrictMode */); |
Remi NGUYEN VAN | e67b0c3 | 2018-12-27 16:43:56 +0900 | [diff] [blame] | 5598 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5599 | mMockVpn.connect(false); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5600 | |
Lorenzo Colitti | 515b6d8 | 2020-11-19 23:20:55 +0900 | [diff] [blame] | 5601 | genericNetworkCallback.expectAvailableThenValidatedCallbacks(mMockVpn); |
Chalard Jean | b552c46 | 2018-02-21 18:43:54 +0900 | [diff] [blame] | 5602 | genericNotVpnNetworkCallback.assertNoCallback(); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5603 | wifiNetworkCallback.assertNoCallback(); |
Lorenzo Colitti | 515b6d8 | 2020-11-19 23:20:55 +0900 | [diff] [blame] | 5604 | vpnNetworkCallback.expectAvailableThenValidatedCallbacks(mMockVpn); |
| 5605 | defaultCallback.expectAvailableThenValidatedCallbacks(mMockVpn); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 5606 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5607 | |
| 5608 | ranges.clear(); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5609 | mMockVpn.setUids(ranges); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5610 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5611 | genericNetworkCallback.expectCallback(CallbackEntry.LOST, mMockVpn); |
Chalard Jean | b552c46 | 2018-02-21 18:43:54 +0900 | [diff] [blame] | 5612 | genericNotVpnNetworkCallback.assertNoCallback(); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5613 | wifiNetworkCallback.assertNoCallback(); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5614 | vpnNetworkCallback.expectCallback(CallbackEntry.LOST, mMockVpn); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5615 | |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 5616 | // TODO : The default network callback should actually get a LOST call here (also see the |
| 5617 | // comment below for AVAILABLE). This is because ConnectivityService does not look at UID |
| 5618 | // ranges at all when determining whether a network should be rematched. In practice, VPNs |
| 5619 | // can't currently update their UIDs without disconnecting, so this does not matter too |
| 5620 | // much, but that is the reason the test here has to check for an update to the |
| 5621 | // capabilities instead of the expected LOST then AVAILABLE. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5622 | defaultCallback.expectCallback(CallbackEntry.NETWORK_CAPS_UPDATED, mMockVpn); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 5623 | |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5624 | ranges.add(new UidRange(uid, uid)); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5625 | mMockVpn.setUids(ranges); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5626 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5627 | genericNetworkCallback.expectAvailableCallbacksValidated(mMockVpn); |
Chalard Jean | b552c46 | 2018-02-21 18:43:54 +0900 | [diff] [blame] | 5628 | genericNotVpnNetworkCallback.assertNoCallback(); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5629 | wifiNetworkCallback.assertNoCallback(); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5630 | vpnNetworkCallback.expectAvailableCallbacksValidated(mMockVpn); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 5631 | // TODO : Here like above, AVAILABLE would be correct, but because this can't actually |
| 5632 | // happen outside of the test, ConnectivityService does not rematch callbacks. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5633 | defaultCallback.expectCallback(CallbackEntry.NETWORK_CAPS_UPDATED, mMockVpn); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5634 | |
| 5635 | mWiFiNetworkAgent.disconnect(); |
| 5636 | |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 5637 | genericNetworkCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
| 5638 | genericNotVpnNetworkCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
| 5639 | wifiNetworkCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5640 | vpnNetworkCallback.assertNoCallback(); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 5641 | defaultCallback.assertNoCallback(); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5642 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5643 | mMockVpn.disconnect(); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5644 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5645 | genericNetworkCallback.expectCallback(CallbackEntry.LOST, mMockVpn); |
Chalard Jean | b552c46 | 2018-02-21 18:43:54 +0900 | [diff] [blame] | 5646 | genericNotVpnNetworkCallback.assertNoCallback(); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5647 | wifiNetworkCallback.assertNoCallback(); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5648 | vpnNetworkCallback.expectCallback(CallbackEntry.LOST, mMockVpn); |
| 5649 | defaultCallback.expectCallback(CallbackEntry.LOST, mMockVpn); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 5650 | assertEquals(null, mCm.getActiveNetwork()); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5651 | |
| 5652 | mCm.unregisterNetworkCallback(genericNetworkCallback); |
| 5653 | mCm.unregisterNetworkCallback(wifiNetworkCallback); |
| 5654 | mCm.unregisterNetworkCallback(vpnNetworkCallback); |
Chalard Jean | fb0c87e | 2018-04-18 19:18:58 +0900 | [diff] [blame] | 5655 | mCm.unregisterNetworkCallback(defaultCallback); |
Chalard Jean | 0b214af | 2018-01-12 17:22:49 +0900 | [diff] [blame] | 5656 | } |
Chalard Jean | 2640049 | 2018-04-18 20:18:38 +0900 | [diff] [blame] | 5657 | |
| 5658 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 5659 | public void testVpnWithoutInternet() throws Exception { |
Chalard Jean | 2640049 | 2018-04-18 20:18:38 +0900 | [diff] [blame] | 5660 | final int uid = Process.myUid(); |
| 5661 | |
| 5662 | final TestNetworkCallback defaultCallback = new TestNetworkCallback(); |
| 5663 | mCm.registerDefaultNetworkCallback(defaultCallback); |
Chalard Jean | 2640049 | 2018-04-18 20:18:38 +0900 | [diff] [blame] | 5664 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 5665 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Chalard Jean | 2640049 | 2018-04-18 20:18:38 +0900 | [diff] [blame] | 5666 | mWiFiNetworkAgent.connect(true); |
| 5667 | |
| 5668 | defaultCallback.expectAvailableThenValidatedCallbacks(mWiFiNetworkAgent); |
| 5669 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
| 5670 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5671 | mMockVpn.establishForMyUid(true /* validated */, false /* hasInternet */, |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 5672 | false /* isStrictMode */); |
Chalard Jean | 2640049 | 2018-04-18 20:18:38 +0900 | [diff] [blame] | 5673 | |
| 5674 | defaultCallback.assertNoCallback(); |
| 5675 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
| 5676 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5677 | mMockVpn.disconnect(); |
Chalard Jean | 2640049 | 2018-04-18 20:18:38 +0900 | [diff] [blame] | 5678 | defaultCallback.assertNoCallback(); |
| 5679 | |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 5680 | mCm.unregisterNetworkCallback(defaultCallback); |
| 5681 | } |
| 5682 | |
| 5683 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 5684 | public void testVpnWithInternet() throws Exception { |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 5685 | final int uid = Process.myUid(); |
| 5686 | |
| 5687 | final TestNetworkCallback defaultCallback = new TestNetworkCallback(); |
| 5688 | mCm.registerDefaultNetworkCallback(defaultCallback); |
| 5689 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 5690 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 5691 | mWiFiNetworkAgent.connect(true); |
| 5692 | |
| 5693 | defaultCallback.expectAvailableThenValidatedCallbacks(mWiFiNetworkAgent); |
| 5694 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
| 5695 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5696 | mMockVpn.establishForMyUid(true /* validated */, true /* hasInternet */, |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 5697 | false /* isStrictMode */); |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 5698 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5699 | defaultCallback.expectAvailableThenValidatedCallbacks(mMockVpn); |
Chalard Jean | 2640049 | 2018-04-18 20:18:38 +0900 | [diff] [blame] | 5700 | assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork()); |
| 5701 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5702 | mMockVpn.disconnect(); |
| 5703 | defaultCallback.expectCallback(CallbackEntry.LOST, mMockVpn); |
Chalard Jean | 2640049 | 2018-04-18 20:18:38 +0900 | [diff] [blame] | 5704 | defaultCallback.expectAvailableCallbacksValidated(mWiFiNetworkAgent); |
| 5705 | |
Chalard Jean | 2640049 | 2018-04-18 20:18:38 +0900 | [diff] [blame] | 5706 | mCm.unregisterNetworkCallback(defaultCallback); |
| 5707 | } |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5708 | |
| 5709 | @Test |
Lorenzo Colitti | 80986d9 | 2019-03-22 00:28:28 +0900 | [diff] [blame] | 5710 | public void testVpnUnvalidated() throws Exception { |
| 5711 | final TestNetworkCallback callback = new TestNetworkCallback(); |
| 5712 | mCm.registerDefaultNetworkCallback(callback); |
| 5713 | |
| 5714 | // Bring up Ethernet. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 5715 | mEthernetNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_ETHERNET); |
Lorenzo Colitti | 80986d9 | 2019-03-22 00:28:28 +0900 | [diff] [blame] | 5716 | mEthernetNetworkAgent.connect(true); |
| 5717 | callback.expectAvailableThenValidatedCallbacks(mEthernetNetworkAgent); |
| 5718 | callback.assertNoCallback(); |
| 5719 | |
| 5720 | // Bring up a VPN that has the INTERNET capability, initially unvalidated. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5721 | mMockVpn.establishForMyUid(false /* validated */, true /* hasInternet */, |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 5722 | false /* isStrictMode */); |
Lorenzo Colitti | 80986d9 | 2019-03-22 00:28:28 +0900 | [diff] [blame] | 5723 | |
| 5724 | // Even though the VPN is unvalidated, it becomes the default network for our app. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5725 | callback.expectAvailableCallbacksUnvalidated(mMockVpn); |
Lorenzo Colitti | 80986d9 | 2019-03-22 00:28:28 +0900 | [diff] [blame] | 5726 | callback.assertNoCallback(); |
| 5727 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5728 | assertTrue(mMockVpn.getAgent().getScore() > mEthernetNetworkAgent.getScore()); |
| 5729 | assertEquals(ConnectivityConstants.VPN_DEFAULT_SCORE, mMockVpn.getAgent().getScore()); |
| 5730 | assertEquals(mMockVpn.getNetwork(), mCm.getActiveNetwork()); |
Lorenzo Colitti | 80986d9 | 2019-03-22 00:28:28 +0900 | [diff] [blame] | 5731 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5732 | NetworkCapabilities nc = mCm.getNetworkCapabilities(mMockVpn.getNetwork()); |
Lorenzo Colitti | 80986d9 | 2019-03-22 00:28:28 +0900 | [diff] [blame] | 5733 | assertFalse(nc.hasCapability(NET_CAPABILITY_VALIDATED)); |
| 5734 | assertTrue(nc.hasCapability(NET_CAPABILITY_INTERNET)); |
| 5735 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 5736 | assertFalse(NetworkMonitorUtils.isValidationRequired( |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5737 | mMockVpn.getAgent().getNetworkCapabilities())); |
Lorenzo Colitti | 80986d9 | 2019-03-22 00:28:28 +0900 | [diff] [blame] | 5738 | assertTrue(NetworkMonitorUtils.isPrivateDnsValidationRequired( |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5739 | mMockVpn.getAgent().getNetworkCapabilities())); |
Lorenzo Colitti | 80986d9 | 2019-03-22 00:28:28 +0900 | [diff] [blame] | 5740 | |
| 5741 | // Pretend that the VPN network validates. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5742 | mMockVpn.getAgent().setNetworkValid(false /* isStrictMode */); |
| 5743 | mMockVpn.getAgent().mNetworkMonitor.forceReevaluation(Process.myUid()); |
Lorenzo Colitti | 80986d9 | 2019-03-22 00:28:28 +0900 | [diff] [blame] | 5744 | // Expect to see the validated capability, but no other changes, because the VPN is already |
| 5745 | // the default network for the app. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5746 | callback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mMockVpn); |
Lorenzo Colitti | 80986d9 | 2019-03-22 00:28:28 +0900 | [diff] [blame] | 5747 | callback.assertNoCallback(); |
| 5748 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5749 | mMockVpn.disconnect(); |
| 5750 | callback.expectCallback(CallbackEntry.LOST, mMockVpn); |
Lorenzo Colitti | 80986d9 | 2019-03-22 00:28:28 +0900 | [diff] [blame] | 5751 | callback.expectAvailableCallbacksValidated(mEthernetNetworkAgent); |
| 5752 | } |
| 5753 | |
| 5754 | @Test |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5755 | public void testVpnStartsWithUnderlyingCaps() throws Exception { |
| 5756 | final int uid = Process.myUid(); |
| 5757 | |
| 5758 | final TestNetworkCallback vpnNetworkCallback = new TestNetworkCallback(); |
| 5759 | final NetworkRequest vpnNetworkRequest = new NetworkRequest.Builder() |
| 5760 | .removeCapability(NET_CAPABILITY_NOT_VPN) |
| 5761 | .addTransportType(TRANSPORT_VPN) |
| 5762 | .build(); |
| 5763 | mCm.registerNetworkCallback(vpnNetworkRequest, vpnNetworkCallback); |
| 5764 | vpnNetworkCallback.assertNoCallback(); |
| 5765 | |
| 5766 | // Connect cell. It will become the default network, and in the absence of setting |
| 5767 | // underlying networks explicitly it will become the sole underlying network for the vpn. |
| 5768 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
| 5769 | mCellNetworkAgent.addCapability(NET_CAPABILITY_NOT_SUSPENDED); |
| 5770 | mCellNetworkAgent.connect(true); |
| 5771 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5772 | mMockVpn.establishForMyUid(true /* validated */, false /* hasInternet */, |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5773 | false /* isStrictMode */); |
| 5774 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5775 | vpnNetworkCallback.expectAvailableCallbacks(mMockVpn.getNetwork(), |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5776 | false /* suspended */, false /* validated */, false /* blocked */, TIMEOUT_MS); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5777 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn.getNetwork(), TIMEOUT_MS, |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5778 | nc -> nc.hasCapability(NET_CAPABILITY_VALIDATED)); |
| 5779 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5780 | final NetworkCapabilities nc = mCm.getNetworkCapabilities(mMockVpn.getNetwork()); |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5781 | assertTrue(nc.hasTransport(TRANSPORT_VPN)); |
| 5782 | assertTrue(nc.hasTransport(TRANSPORT_CELLULAR)); |
| 5783 | assertFalse(nc.hasTransport(TRANSPORT_WIFI)); |
| 5784 | assertTrue(nc.hasCapability(NET_CAPABILITY_VALIDATED)); |
| 5785 | assertFalse(nc.hasCapability(NET_CAPABILITY_NOT_METERED)); |
| 5786 | assertTrue(nc.hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
| 5787 | } |
| 5788 | |
Lorenzo Colitti | 503245d | 2020-12-15 00:45:30 +0900 | [diff] [blame] | 5789 | private void assertDefaultNetworkCapabilities(int userId, NetworkAgentWrapper... networks) { |
| 5790 | final NetworkCapabilities[] defaultCaps = mService.getDefaultNetworkCapabilitiesForUser( |
| 5791 | userId, "com.android.calling.package"); |
| 5792 | final String defaultCapsString = Arrays.toString(defaultCaps); |
| 5793 | assertEquals(defaultCapsString, defaultCaps.length, networks.length); |
| 5794 | final Set<NetworkCapabilities> defaultCapsSet = new ArraySet<>(defaultCaps); |
| 5795 | for (NetworkAgentWrapper network : networks) { |
| 5796 | final NetworkCapabilities nc = mCm.getNetworkCapabilities(network.getNetwork()); |
| 5797 | final String msg = "Did not find " + nc + " in " + Arrays.toString(defaultCaps); |
| 5798 | assertTrue(msg, defaultCapsSet.contains(nc)); |
| 5799 | } |
| 5800 | } |
| 5801 | |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5802 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 5803 | public void testVpnSetUnderlyingNetworks() throws Exception { |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5804 | final TestNetworkCallback vpnNetworkCallback = new TestNetworkCallback(); |
| 5805 | final NetworkRequest vpnNetworkRequest = new NetworkRequest.Builder() |
| 5806 | .removeCapability(NET_CAPABILITY_NOT_VPN) |
| 5807 | .addTransportType(TRANSPORT_VPN) |
| 5808 | .build(); |
| 5809 | NetworkCapabilities nc; |
| 5810 | mCm.registerNetworkCallback(vpnNetworkRequest, vpnNetworkCallback); |
| 5811 | vpnNetworkCallback.assertNoCallback(); |
| 5812 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5813 | mMockVpn.establishForMyUid(true /* validated */, false /* hasInternet */, |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 5814 | false /* isStrictMode */); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5815 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5816 | vpnNetworkCallback.expectAvailableThenValidatedCallbacks(mMockVpn); |
| 5817 | nc = mCm.getNetworkCapabilities(mMockVpn.getNetwork()); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5818 | assertTrue(nc.hasTransport(TRANSPORT_VPN)); |
| 5819 | assertFalse(nc.hasTransport(TRANSPORT_CELLULAR)); |
| 5820 | assertFalse(nc.hasTransport(TRANSPORT_WIFI)); |
| 5821 | // For safety reasons a VPN without underlying networks is considered metered. |
| 5822 | assertFalse(nc.hasCapability(NET_CAPABILITY_NOT_METERED)); |
Treehugger Robot | cbb1fd0 | 2020-05-15 07:14:29 +0000 | [diff] [blame] | 5823 | // A VPN without underlying networks is not suspended. |
| 5824 | assertTrue(nc.hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5825 | |
Lorenzo Colitti | 503245d | 2020-12-15 00:45:30 +0900 | [diff] [blame] | 5826 | final int userId = UserHandle.getUserId(Process.myUid()); |
| 5827 | assertDefaultNetworkCapabilities(userId /* no networks */); |
| 5828 | |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5829 | // Connect cell and use it as an underlying network. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 5830 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5831 | mCellNetworkAgent.addCapability(NET_CAPABILITY_NOT_SUSPENDED); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5832 | mCellNetworkAgent.connect(true); |
| 5833 | |
| 5834 | mService.setUnderlyingNetworksForVpn( |
| 5835 | new Network[] { mCellNetworkAgent.getNetwork() }); |
| 5836 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5837 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn, |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5838 | (caps) -> caps.hasTransport(TRANSPORT_VPN) |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5839 | && caps.hasTransport(TRANSPORT_CELLULAR) && !caps.hasTransport(TRANSPORT_WIFI) |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5840 | && !caps.hasCapability(NET_CAPABILITY_NOT_METERED) |
| 5841 | && caps.hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
Lorenzo Colitti | 503245d | 2020-12-15 00:45:30 +0900 | [diff] [blame] | 5842 | assertDefaultNetworkCapabilities(userId, mCellNetworkAgent); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5843 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 5844 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5845 | mWiFiNetworkAgent.addCapability(NET_CAPABILITY_NOT_METERED); |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5846 | mWiFiNetworkAgent.addCapability(NET_CAPABILITY_NOT_SUSPENDED); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5847 | mWiFiNetworkAgent.connect(true); |
| 5848 | |
| 5849 | mService.setUnderlyingNetworksForVpn( |
| 5850 | new Network[] { mCellNetworkAgent.getNetwork(), mWiFiNetworkAgent.getNetwork() }); |
| 5851 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5852 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn, |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5853 | (caps) -> caps.hasTransport(TRANSPORT_VPN) |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5854 | && caps.hasTransport(TRANSPORT_CELLULAR) && caps.hasTransport(TRANSPORT_WIFI) |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5855 | && !caps.hasCapability(NET_CAPABILITY_NOT_METERED) |
| 5856 | && caps.hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
Lorenzo Colitti | 503245d | 2020-12-15 00:45:30 +0900 | [diff] [blame] | 5857 | assertDefaultNetworkCapabilities(userId, mCellNetworkAgent, mWiFiNetworkAgent); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5858 | |
| 5859 | // Don't disconnect, but note the VPN is not using wifi any more. |
| 5860 | mService.setUnderlyingNetworksForVpn( |
| 5861 | new Network[] { mCellNetworkAgent.getNetwork() }); |
| 5862 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5863 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn, |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5864 | (caps) -> caps.hasTransport(TRANSPORT_VPN) |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5865 | && caps.hasTransport(TRANSPORT_CELLULAR) && !caps.hasTransport(TRANSPORT_WIFI) |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5866 | && !caps.hasCapability(NET_CAPABILITY_NOT_METERED) |
| 5867 | && caps.hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
Lorenzo Colitti | 503245d | 2020-12-15 00:45:30 +0900 | [diff] [blame] | 5868 | // The return value of getDefaultNetworkCapabilitiesForUser always includes the default |
| 5869 | // network (wifi) as well as the underlying networks (cell). |
| 5870 | assertDefaultNetworkCapabilities(userId, mCellNetworkAgent, mWiFiNetworkAgent); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5871 | |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5872 | // Remove NOT_SUSPENDED from the only network and observe VPN is now suspended. |
| 5873 | mCellNetworkAgent.removeCapability(NET_CAPABILITY_NOT_SUSPENDED); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5874 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn, |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5875 | (caps) -> caps.hasTransport(TRANSPORT_VPN) |
| 5876 | && caps.hasTransport(TRANSPORT_CELLULAR) && !caps.hasTransport(TRANSPORT_WIFI) |
| 5877 | && !caps.hasCapability(NET_CAPABILITY_NOT_METERED) |
| 5878 | && !caps.hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5879 | vpnNetworkCallback.expectCallback(CallbackEntry.SUSPENDED, mMockVpn); |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5880 | |
| 5881 | // Add NOT_SUSPENDED again and observe VPN is no longer suspended. |
| 5882 | mCellNetworkAgent.addCapability(NET_CAPABILITY_NOT_SUSPENDED); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5883 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn, |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5884 | (caps) -> caps.hasTransport(TRANSPORT_VPN) |
| 5885 | && caps.hasTransport(TRANSPORT_CELLULAR) && !caps.hasTransport(TRANSPORT_WIFI) |
| 5886 | && !caps.hasCapability(NET_CAPABILITY_NOT_METERED) |
| 5887 | && caps.hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5888 | vpnNetworkCallback.expectCallback(CallbackEntry.RESUMED, mMockVpn); |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5889 | |
| 5890 | // Use Wifi but not cell. Note the VPN is now unmetered and not suspended. |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5891 | mService.setUnderlyingNetworksForVpn( |
| 5892 | new Network[] { mWiFiNetworkAgent.getNetwork() }); |
| 5893 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5894 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn, |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5895 | (caps) -> caps.hasTransport(TRANSPORT_VPN) |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5896 | && !caps.hasTransport(TRANSPORT_CELLULAR) && caps.hasTransport(TRANSPORT_WIFI) |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5897 | && caps.hasCapability(NET_CAPABILITY_NOT_METERED) |
| 5898 | && caps.hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
Lorenzo Colitti | 503245d | 2020-12-15 00:45:30 +0900 | [diff] [blame] | 5899 | assertDefaultNetworkCapabilities(userId, mWiFiNetworkAgent); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5900 | |
| 5901 | // Use both again. |
| 5902 | mService.setUnderlyingNetworksForVpn( |
| 5903 | new Network[] { mCellNetworkAgent.getNetwork(), mWiFiNetworkAgent.getNetwork() }); |
| 5904 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5905 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn, |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5906 | (caps) -> caps.hasTransport(TRANSPORT_VPN) |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5907 | && caps.hasTransport(TRANSPORT_CELLULAR) && caps.hasTransport(TRANSPORT_WIFI) |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5908 | && !caps.hasCapability(NET_CAPABILITY_NOT_METERED) |
| 5909 | && caps.hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
Lorenzo Colitti | 503245d | 2020-12-15 00:45:30 +0900 | [diff] [blame] | 5910 | assertDefaultNetworkCapabilities(userId, mCellNetworkAgent, mWiFiNetworkAgent); |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5911 | |
| 5912 | // Cell is suspended again. As WiFi is not, this should not cause a callback. |
| 5913 | mCellNetworkAgent.removeCapability(NET_CAPABILITY_NOT_SUSPENDED); |
| 5914 | vpnNetworkCallback.assertNoCallback(); |
| 5915 | |
| 5916 | // Stop using WiFi. The VPN is suspended again. |
| 5917 | mService.setUnderlyingNetworksForVpn( |
| 5918 | new Network[] { mCellNetworkAgent.getNetwork() }); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5919 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn, |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5920 | (caps) -> caps.hasTransport(TRANSPORT_VPN) |
| 5921 | && caps.hasTransport(TRANSPORT_CELLULAR) |
| 5922 | && !caps.hasCapability(NET_CAPABILITY_NOT_METERED) |
| 5923 | && !caps.hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
Lorenzo Colitti | b9a8d8e | 2021-01-11 22:27:57 +0900 | [diff] [blame^] | 5924 | vpnNetworkCallback.expectCallback(CallbackEntry.SUSPENDED, mMockVpn); |
Lorenzo Colitti | 503245d | 2020-12-15 00:45:30 +0900 | [diff] [blame] | 5925 | assertDefaultNetworkCapabilities(userId, mCellNetworkAgent, mWiFiNetworkAgent); |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5926 | |
| 5927 | // Use both again. |
| 5928 | mService.setUnderlyingNetworksForVpn( |
| 5929 | new Network[] { mCellNetworkAgent.getNetwork(), mWiFiNetworkAgent.getNetwork() }); |
| 5930 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5931 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn, |
Chalard Jean | 8e53c79 | 2020-05-11 04:59:35 +0000 | [diff] [blame] | 5932 | (caps) -> caps.hasTransport(TRANSPORT_VPN) |
| 5933 | && caps.hasTransport(TRANSPORT_CELLULAR) && caps.hasTransport(TRANSPORT_WIFI) |
| 5934 | && !caps.hasCapability(NET_CAPABILITY_NOT_METERED) |
| 5935 | && caps.hasCapability(NET_CAPABILITY_NOT_SUSPENDED)); |
Lorenzo Colitti | b9a8d8e | 2021-01-11 22:27:57 +0900 | [diff] [blame^] | 5936 | vpnNetworkCallback.expectCallback(CallbackEntry.RESUMED, mMockVpn); |
Lorenzo Colitti | 503245d | 2020-12-15 00:45:30 +0900 | [diff] [blame] | 5937 | assertDefaultNetworkCapabilities(userId, mCellNetworkAgent, mWiFiNetworkAgent); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5938 | |
Chalard Jean | 6b65ec7 | 2018-05-18 22:02:56 +0900 | [diff] [blame] | 5939 | // Disconnect cell. Receive update without even removing the dead network from the |
| 5940 | // underlying networks – it's dead anyway. Not metered any more. |
| 5941 | mCellNetworkAgent.disconnect(); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5942 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn, |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5943 | (caps) -> caps.hasTransport(TRANSPORT_VPN) |
Chalard Jean | 6b65ec7 | 2018-05-18 22:02:56 +0900 | [diff] [blame] | 5944 | && !caps.hasTransport(TRANSPORT_CELLULAR) && caps.hasTransport(TRANSPORT_WIFI) |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5945 | && caps.hasCapability(NET_CAPABILITY_NOT_METERED)); |
Lorenzo Colitti | 503245d | 2020-12-15 00:45:30 +0900 | [diff] [blame] | 5946 | assertDefaultNetworkCapabilities(userId, mWiFiNetworkAgent); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5947 | |
Chalard Jean | b3ab0d1 | 2018-05-21 15:30:56 +0900 | [diff] [blame] | 5948 | // Disconnect wifi too. No underlying networks means this is now metered. |
Chalard Jean | 6b65ec7 | 2018-05-18 22:02:56 +0900 | [diff] [blame] | 5949 | mWiFiNetworkAgent.disconnect(); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5950 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn, |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5951 | (caps) -> caps.hasTransport(TRANSPORT_VPN) |
Chalard Jean | 6b65ec7 | 2018-05-18 22:02:56 +0900 | [diff] [blame] | 5952 | && !caps.hasTransport(TRANSPORT_CELLULAR) && !caps.hasTransport(TRANSPORT_WIFI) |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5953 | && !caps.hasCapability(NET_CAPABILITY_NOT_METERED)); |
Lorenzo Colitti | 503245d | 2020-12-15 00:45:30 +0900 | [diff] [blame] | 5954 | // When a network disconnects, the callbacks are fired before all state is updated, so for a |
| 5955 | // short time, synchronous calls will behave as if the network is still connected. Wait for |
| 5956 | // things to settle. |
| 5957 | waitForIdle(); |
| 5958 | assertDefaultNetworkCapabilities(userId /* no networks */); |
Chalard Jean | f89e8da | 2018-05-18 21:47:45 +0900 | [diff] [blame] | 5959 | |
| 5960 | mMockVpn.disconnect(); |
| 5961 | } |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 5962 | |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 5963 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 5964 | public void testNullUnderlyingNetworks() throws Exception { |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 5965 | final int uid = Process.myUid(); |
| 5966 | |
| 5967 | final TestNetworkCallback vpnNetworkCallback = new TestNetworkCallback(); |
| 5968 | final NetworkRequest vpnNetworkRequest = new NetworkRequest.Builder() |
| 5969 | .removeCapability(NET_CAPABILITY_NOT_VPN) |
| 5970 | .addTransportType(TRANSPORT_VPN) |
| 5971 | .build(); |
| 5972 | NetworkCapabilities nc; |
| 5973 | mCm.registerNetworkCallback(vpnNetworkRequest, vpnNetworkCallback); |
| 5974 | vpnNetworkCallback.assertNoCallback(); |
| 5975 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5976 | mMockVpn.establishForMyUid(true /* validated */, false /* hasInternet */, |
lucaslin | 783f221 | 2019-10-22 18:27:33 +0800 | [diff] [blame] | 5977 | false /* isStrictMode */); |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 5978 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5979 | vpnNetworkCallback.expectAvailableThenValidatedCallbacks(mMockVpn); |
| 5980 | nc = mCm.getNetworkCapabilities(mMockVpn.getNetwork()); |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 5981 | assertTrue(nc.hasTransport(TRANSPORT_VPN)); |
| 5982 | assertFalse(nc.hasTransport(TRANSPORT_CELLULAR)); |
| 5983 | assertFalse(nc.hasTransport(TRANSPORT_WIFI)); |
| 5984 | // By default, VPN is set to track default network (i.e. its underlying networks is null). |
| 5985 | // In case of no default network, VPN is considered metered. |
| 5986 | assertFalse(nc.hasCapability(NET_CAPABILITY_NOT_METERED)); |
| 5987 | |
| 5988 | // Connect to Cell; Cell is the default network. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 5989 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 5990 | mCellNetworkAgent.connect(true); |
| 5991 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 5992 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn, |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5993 | (caps) -> caps.hasTransport(TRANSPORT_VPN) |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 5994 | && caps.hasTransport(TRANSPORT_CELLULAR) && !caps.hasTransport(TRANSPORT_WIFI) |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 5995 | && !caps.hasCapability(NET_CAPABILITY_NOT_METERED)); |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 5996 | |
| 5997 | // Connect to WiFi; WiFi is the new default. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 5998 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 5999 | mWiFiNetworkAgent.addCapability(NET_CAPABILITY_NOT_METERED); |
| 6000 | mWiFiNetworkAgent.connect(true); |
| 6001 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6002 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn, |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 6003 | (caps) -> caps.hasTransport(TRANSPORT_VPN) |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 6004 | && !caps.hasTransport(TRANSPORT_CELLULAR) && caps.hasTransport(TRANSPORT_WIFI) |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 6005 | && caps.hasCapability(NET_CAPABILITY_NOT_METERED)); |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 6006 | |
| 6007 | // Disconnect Cell. The default network did not change, so there shouldn't be any changes in |
| 6008 | // the capabilities. |
| 6009 | mCellNetworkAgent.disconnect(); |
| 6010 | |
| 6011 | // Disconnect wifi too. Now we have no default network. |
| 6012 | mWiFiNetworkAgent.disconnect(); |
| 6013 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6014 | vpnNetworkCallback.expectCapabilitiesThat(mMockVpn, |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 6015 | (caps) -> caps.hasTransport(TRANSPORT_VPN) |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 6016 | && !caps.hasTransport(TRANSPORT_CELLULAR) && !caps.hasTransport(TRANSPORT_WIFI) |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 6017 | && !caps.hasCapability(NET_CAPABILITY_NOT_METERED)); |
Varun Anand | 4fa80e8 | 2019-02-06 10:13:38 -0800 | [diff] [blame] | 6018 | |
| 6019 | mMockVpn.disconnect(); |
| 6020 | } |
| 6021 | |
| 6022 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6023 | public void testIsActiveNetworkMeteredOverWifi() throws Exception { |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6024 | // Returns true by default when no network is available. |
| 6025 | assertTrue(mCm.isActiveNetworkMetered()); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6026 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6027 | mWiFiNetworkAgent.addCapability(NET_CAPABILITY_NOT_METERED); |
| 6028 | mWiFiNetworkAgent.connect(true); |
| 6029 | waitForIdle(); |
| 6030 | |
| 6031 | assertFalse(mCm.isActiveNetworkMetered()); |
| 6032 | } |
| 6033 | |
| 6034 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6035 | public void testIsActiveNetworkMeteredOverCell() throws Exception { |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6036 | // Returns true by default when no network is available. |
| 6037 | assertTrue(mCm.isActiveNetworkMetered()); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6038 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6039 | mCellNetworkAgent.removeCapability(NET_CAPABILITY_NOT_METERED); |
| 6040 | mCellNetworkAgent.connect(true); |
| 6041 | waitForIdle(); |
| 6042 | |
| 6043 | assertTrue(mCm.isActiveNetworkMetered()); |
| 6044 | } |
| 6045 | |
| 6046 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6047 | public void testIsActiveNetworkMeteredOverVpnTrackingPlatformDefault() throws Exception { |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6048 | // Returns true by default when no network is available. |
| 6049 | assertTrue(mCm.isActiveNetworkMetered()); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6050 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6051 | mCellNetworkAgent.removeCapability(NET_CAPABILITY_NOT_METERED); |
| 6052 | mCellNetworkAgent.connect(true); |
| 6053 | waitForIdle(); |
| 6054 | assertTrue(mCm.isActiveNetworkMetered()); |
| 6055 | |
| 6056 | // Connect VPN network. By default it is using current default network (Cell). |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6057 | mMockVpn.establishForMyUid(); |
| 6058 | |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6059 | // Ensure VPN is now the active network. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6060 | assertEquals(mMockVpn.getNetwork(), mCm.getActiveNetwork()); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6061 | |
| 6062 | // Expect VPN to be metered. |
| 6063 | assertTrue(mCm.isActiveNetworkMetered()); |
| 6064 | |
| 6065 | // Connect WiFi. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6066 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6067 | mWiFiNetworkAgent.addCapability(NET_CAPABILITY_NOT_METERED); |
| 6068 | mWiFiNetworkAgent.connect(true); |
| 6069 | waitForIdle(); |
| 6070 | // VPN should still be the active network. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6071 | assertEquals(mMockVpn.getNetwork(), mCm.getActiveNetwork()); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6072 | |
| 6073 | // Expect VPN to be unmetered as it should now be using WiFi (new default). |
| 6074 | assertFalse(mCm.isActiveNetworkMetered()); |
| 6075 | |
| 6076 | // Disconnecting Cell should not affect VPN's meteredness. |
| 6077 | mCellNetworkAgent.disconnect(); |
| 6078 | waitForIdle(); |
| 6079 | |
| 6080 | assertFalse(mCm.isActiveNetworkMetered()); |
| 6081 | |
| 6082 | // Disconnect WiFi; Now there is no platform default network. |
| 6083 | mWiFiNetworkAgent.disconnect(); |
| 6084 | waitForIdle(); |
| 6085 | |
| 6086 | // VPN without any underlying networks is treated as metered. |
| 6087 | assertTrue(mCm.isActiveNetworkMetered()); |
| 6088 | |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6089 | mMockVpn.disconnect(); |
| 6090 | } |
| 6091 | |
| 6092 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6093 | public void testIsActiveNetworkMeteredOverVpnSpecifyingUnderlyingNetworks() throws Exception { |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6094 | // Returns true by default when no network is available. |
| 6095 | assertTrue(mCm.isActiveNetworkMetered()); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6096 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6097 | mCellNetworkAgent.removeCapability(NET_CAPABILITY_NOT_METERED); |
| 6098 | mCellNetworkAgent.connect(true); |
| 6099 | waitForIdle(); |
| 6100 | assertTrue(mCm.isActiveNetworkMetered()); |
| 6101 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6102 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6103 | mWiFiNetworkAgent.addCapability(NET_CAPABILITY_NOT_METERED); |
| 6104 | mWiFiNetworkAgent.connect(true); |
| 6105 | waitForIdle(); |
| 6106 | assertFalse(mCm.isActiveNetworkMetered()); |
| 6107 | |
| 6108 | // Connect VPN network. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6109 | mMockVpn.establishForMyUid(); |
| 6110 | |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6111 | // Ensure VPN is now the active network. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6112 | assertEquals(mMockVpn.getNetwork(), mCm.getActiveNetwork()); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6113 | // VPN is using Cell |
| 6114 | mService.setUnderlyingNetworksForVpn( |
| 6115 | new Network[] { mCellNetworkAgent.getNetwork() }); |
| 6116 | waitForIdle(); |
| 6117 | |
| 6118 | // Expect VPN to be metered. |
| 6119 | assertTrue(mCm.isActiveNetworkMetered()); |
| 6120 | |
| 6121 | // VPN is now using WiFi |
| 6122 | mService.setUnderlyingNetworksForVpn( |
| 6123 | new Network[] { mWiFiNetworkAgent.getNetwork() }); |
| 6124 | waitForIdle(); |
| 6125 | |
| 6126 | // Expect VPN to be unmetered |
| 6127 | assertFalse(mCm.isActiveNetworkMetered()); |
| 6128 | |
| 6129 | // VPN is using Cell | WiFi. |
| 6130 | mService.setUnderlyingNetworksForVpn( |
| 6131 | new Network[] { mCellNetworkAgent.getNetwork(), mWiFiNetworkAgent.getNetwork() }); |
| 6132 | waitForIdle(); |
| 6133 | |
| 6134 | // Expect VPN to be metered. |
| 6135 | assertTrue(mCm.isActiveNetworkMetered()); |
| 6136 | |
| 6137 | // VPN is using WiFi | Cell. |
| 6138 | mService.setUnderlyingNetworksForVpn( |
| 6139 | new Network[] { mWiFiNetworkAgent.getNetwork(), mCellNetworkAgent.getNetwork() }); |
| 6140 | waitForIdle(); |
| 6141 | |
| 6142 | // Order should not matter and VPN should still be metered. |
| 6143 | assertTrue(mCm.isActiveNetworkMetered()); |
| 6144 | |
| 6145 | // VPN is not using any underlying networks. |
| 6146 | mService.setUnderlyingNetworksForVpn(new Network[0]); |
| 6147 | waitForIdle(); |
| 6148 | |
| 6149 | // VPN without underlying networks is treated as metered. |
| 6150 | assertTrue(mCm.isActiveNetworkMetered()); |
| 6151 | |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6152 | mMockVpn.disconnect(); |
| 6153 | } |
| 6154 | |
| 6155 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6156 | public void testIsActiveNetworkMeteredOverAlwaysMeteredVpn() throws Exception { |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6157 | // Returns true by default when no network is available. |
| 6158 | assertTrue(mCm.isActiveNetworkMetered()); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6159 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6160 | mWiFiNetworkAgent.addCapability(NET_CAPABILITY_NOT_METERED); |
| 6161 | mWiFiNetworkAgent.connect(true); |
| 6162 | waitForIdle(); |
| 6163 | assertFalse(mCm.isActiveNetworkMetered()); |
| 6164 | |
| 6165 | // Connect VPN network. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6166 | mMockVpn.registerAgent(true /* isAlwaysMetered */, uidRangesForUid(Process.myUid()), |
| 6167 | new LinkProperties()); |
| 6168 | mMockVpn.connect(true); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6169 | waitForIdle(); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6170 | assertEquals(mMockVpn.getNetwork(), mCm.getActiveNetwork()); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6171 | |
| 6172 | // VPN is tracking current platform default (WiFi). |
| 6173 | mService.setUnderlyingNetworksForVpn(null); |
| 6174 | waitForIdle(); |
| 6175 | |
| 6176 | // Despite VPN using WiFi (which is unmetered), VPN itself is marked as always metered. |
| 6177 | assertTrue(mCm.isActiveNetworkMetered()); |
| 6178 | |
| 6179 | // VPN explicitly declares WiFi as its underlying network. |
| 6180 | mService.setUnderlyingNetworksForVpn( |
| 6181 | new Network[] { mWiFiNetworkAgent.getNetwork() }); |
| 6182 | waitForIdle(); |
| 6183 | |
| 6184 | // Doesn't really matter whether VPN declares its underlying networks explicitly. |
| 6185 | assertTrue(mCm.isActiveNetworkMetered()); |
| 6186 | |
| 6187 | // With WiFi lost, VPN is basically without any underlying networks. And in that case it is |
| 6188 | // anyways suppose to be metered. |
| 6189 | mWiFiNetworkAgent.disconnect(); |
| 6190 | waitForIdle(); |
| 6191 | |
| 6192 | assertTrue(mCm.isActiveNetworkMetered()); |
| 6193 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6194 | mMockVpn.disconnect(); |
Varun Anand | c51b06d | 2019-02-25 17:22:02 -0800 | [diff] [blame] | 6195 | } |
| 6196 | |
| 6197 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6198 | public void testNetworkBlockedStatus() throws Exception { |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6199 | final TestNetworkCallback cellNetworkCallback = new TestNetworkCallback(); |
| 6200 | final NetworkRequest cellRequest = new NetworkRequest.Builder() |
| 6201 | .addTransportType(TRANSPORT_CELLULAR) |
| 6202 | .build(); |
| 6203 | mCm.registerNetworkCallback(cellRequest, cellNetworkCallback); |
| 6204 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6205 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6206 | mCellNetworkAgent.connect(true); |
| 6207 | cellNetworkCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
| 6208 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6209 | setUidRulesChanged(RULE_REJECT_ALL); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6210 | cellNetworkCallback.expectBlockedStatusCallback(true, mCellNetworkAgent); |
| 6211 | |
| 6212 | // ConnectivityService should cache it not to invoke the callback again. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6213 | setUidRulesChanged(RULE_REJECT_METERED); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6214 | cellNetworkCallback.assertNoCallback(); |
| 6215 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6216 | setUidRulesChanged(RULE_NONE); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6217 | cellNetworkCallback.expectBlockedStatusCallback(false, mCellNetworkAgent); |
| 6218 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6219 | setUidRulesChanged(RULE_REJECT_METERED); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6220 | cellNetworkCallback.expectBlockedStatusCallback(true, mCellNetworkAgent); |
| 6221 | |
| 6222 | // Restrict the network based on UID rule and NOT_METERED capability change. |
| 6223 | mCellNetworkAgent.addCapability(NET_CAPABILITY_NOT_METERED); |
| 6224 | cellNetworkCallback.expectCapabilitiesWith(NET_CAPABILITY_NOT_METERED, mCellNetworkAgent); |
| 6225 | cellNetworkCallback.expectBlockedStatusCallback(false, mCellNetworkAgent); |
| 6226 | mCellNetworkAgent.removeCapability(NET_CAPABILITY_NOT_METERED); |
| 6227 | cellNetworkCallback.expectCapabilitiesWithout(NET_CAPABILITY_NOT_METERED, |
| 6228 | mCellNetworkAgent); |
| 6229 | cellNetworkCallback.expectBlockedStatusCallback(true, mCellNetworkAgent); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6230 | setUidRulesChanged(RULE_ALLOW_METERED); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6231 | cellNetworkCallback.expectBlockedStatusCallback(false, mCellNetworkAgent); |
| 6232 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6233 | setUidRulesChanged(RULE_NONE); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6234 | cellNetworkCallback.assertNoCallback(); |
| 6235 | |
| 6236 | // Restrict the network based on BackgroundRestricted. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6237 | setRestrictBackgroundChanged(true); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6238 | cellNetworkCallback.expectBlockedStatusCallback(true, mCellNetworkAgent); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6239 | setRestrictBackgroundChanged(true); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6240 | cellNetworkCallback.assertNoCallback(); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6241 | setRestrictBackgroundChanged(false); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6242 | cellNetworkCallback.expectBlockedStatusCallback(false, mCellNetworkAgent); |
| 6243 | cellNetworkCallback.assertNoCallback(); |
| 6244 | |
| 6245 | mCm.unregisterNetworkCallback(cellNetworkCallback); |
| 6246 | } |
| 6247 | |
| 6248 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6249 | public void testNetworkBlockedStatusBeforeAndAfterConnect() throws Exception { |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6250 | final TestNetworkCallback defaultCallback = new TestNetworkCallback(); |
| 6251 | mCm.registerDefaultNetworkCallback(defaultCallback); |
| 6252 | |
| 6253 | // No Networkcallbacks invoked before any network is active. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6254 | setUidRulesChanged(RULE_REJECT_ALL); |
| 6255 | setUidRulesChanged(RULE_NONE); |
| 6256 | setUidRulesChanged(RULE_REJECT_METERED); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6257 | defaultCallback.assertNoCallback(); |
| 6258 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6259 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6260 | mCellNetworkAgent.connect(true); |
| 6261 | defaultCallback.expectAvailableCallbacksUnvalidatedAndBlocked(mCellNetworkAgent); |
| 6262 | defaultCallback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mCellNetworkAgent); |
| 6263 | |
| 6264 | // Allow to use the network after switching to NOT_METERED network. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6265 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6266 | mWiFiNetworkAgent.addCapability(NET_CAPABILITY_NOT_METERED); |
| 6267 | mWiFiNetworkAgent.connect(true); |
| 6268 | defaultCallback.expectAvailableDoubleValidatedCallbacks(mWiFiNetworkAgent); |
| 6269 | |
| 6270 | // Switch to METERED network. Restrict the use of the network. |
| 6271 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6272 | defaultCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6273 | defaultCallback.expectAvailableCallbacksValidatedAndBlocked(mCellNetworkAgent); |
| 6274 | |
| 6275 | // Network becomes NOT_METERED. |
| 6276 | mCellNetworkAgent.addCapability(NET_CAPABILITY_NOT_METERED); |
| 6277 | defaultCallback.expectCapabilitiesWith(NET_CAPABILITY_NOT_METERED, mCellNetworkAgent); |
| 6278 | defaultCallback.expectBlockedStatusCallback(false, mCellNetworkAgent); |
| 6279 | |
| 6280 | // Verify there's no Networkcallbacks invoked after data saver on/off. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6281 | setRestrictBackgroundChanged(true); |
| 6282 | setRestrictBackgroundChanged(false); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6283 | defaultCallback.assertNoCallback(); |
| 6284 | |
| 6285 | mCellNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6286 | defaultCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
Mike Yu | f972975 | 2018-08-17 15:22:05 +0800 | [diff] [blame] | 6287 | defaultCallback.assertNoCallback(); |
| 6288 | |
| 6289 | mCm.unregisterNetworkCallback(defaultCallback); |
| 6290 | } |
| 6291 | |
Lorenzo Colitti | 1cfd6b6 | 2021-01-28 18:31:31 +0900 | [diff] [blame] | 6292 | private void checkNetworkInfo(NetworkInfo ni, int type, DetailedState state) { |
| 6293 | assertNotNull(ni); |
| 6294 | assertEquals(type, ni.getType()); |
| 6295 | assertEquals(ConnectivityManager.getNetworkTypeName(type), state, ni.getDetailedState()); |
| 6296 | } |
| 6297 | |
| 6298 | private void assertActiveNetworkInfo(int type, DetailedState state) { |
| 6299 | checkNetworkInfo(mCm.getActiveNetworkInfo(), type, state); |
| 6300 | } |
| 6301 | private void assertNetworkInfo(int type, DetailedState state) { |
| 6302 | checkNetworkInfo(mCm.getNetworkInfo(type), type, state); |
| 6303 | } |
| 6304 | |
Chalard Jean | 143124b | 2019-12-03 22:13:37 +0900 | [diff] [blame] | 6305 | @Test |
| 6306 | public final void testLoseTrusted() throws Exception { |
| 6307 | final NetworkRequest trustedRequest = new NetworkRequest.Builder() |
| 6308 | .addCapability(NET_CAPABILITY_TRUSTED) |
| 6309 | .build(); |
| 6310 | final TestNetworkCallback trustedCallback = new TestNetworkCallback(); |
| 6311 | mCm.requestNetwork(trustedRequest, trustedCallback); |
| 6312 | |
| 6313 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
| 6314 | mCellNetworkAgent.connect(true); |
| 6315 | trustedCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
| 6316 | verify(mNetworkManagementService).setDefaultNetId(eq(mCellNetworkAgent.getNetwork().netId)); |
Chalard Jean | 25be037 | 2019-12-03 22:16:26 +0900 | [diff] [blame] | 6317 | reset(mNetworkManagementService); |
Chalard Jean | 143124b | 2019-12-03 22:13:37 +0900 | [diff] [blame] | 6318 | |
| 6319 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
| 6320 | mWiFiNetworkAgent.connect(true); |
Chalard Jean | 10c8d54 | 2020-02-20 07:32:12 +0000 | [diff] [blame] | 6321 | trustedCallback.expectAvailableDoubleValidatedCallbacks(mWiFiNetworkAgent); |
Chalard Jean | 143124b | 2019-12-03 22:13:37 +0900 | [diff] [blame] | 6322 | verify(mNetworkManagementService).setDefaultNetId(eq(mWiFiNetworkAgent.getNetwork().netId)); |
Chalard Jean | 25be037 | 2019-12-03 22:16:26 +0900 | [diff] [blame] | 6323 | reset(mNetworkManagementService); |
Chalard Jean | 143124b | 2019-12-03 22:13:37 +0900 | [diff] [blame] | 6324 | |
| 6325 | mWiFiNetworkAgent.removeCapability(NET_CAPABILITY_TRUSTED); |
Chalard Jean | 143124b | 2019-12-03 22:13:37 +0900 | [diff] [blame] | 6326 | trustedCallback.expectAvailableCallbacksValidated(mCellNetworkAgent); |
| 6327 | verify(mNetworkManagementService).setDefaultNetId(eq(mCellNetworkAgent.getNetwork().netId)); |
Chalard Jean | 25be037 | 2019-12-03 22:16:26 +0900 | [diff] [blame] | 6328 | reset(mNetworkManagementService); |
Chalard Jean | 143124b | 2019-12-03 22:13:37 +0900 | [diff] [blame] | 6329 | |
| 6330 | mCellNetworkAgent.removeCapability(NET_CAPABILITY_TRUSTED); |
| 6331 | trustedCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
| 6332 | verify(mNetworkManagementService).clearDefaultNetId(); |
| 6333 | |
| 6334 | mCm.unregisterNetworkCallback(trustedCallback); |
| 6335 | } |
| 6336 | |
Chalard Jean | b6ec076 | 2019-12-03 16:12:33 +0900 | [diff] [blame] | 6337 | @Ignore // 40%+ flakiness : figure out why and re-enable. |
Chalard Jean | 587758b | 2019-11-29 16:41:50 +0900 | [diff] [blame] | 6338 | @Test |
| 6339 | public final void testBatteryStatsNetworkType() throws Exception { |
| 6340 | final LinkProperties cellLp = new LinkProperties(); |
| 6341 | cellLp.setInterfaceName("cell0"); |
| 6342 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR, cellLp); |
| 6343 | mCellNetworkAgent.connect(true); |
| 6344 | waitForIdle(); |
| 6345 | verify(mBatteryStatsService).noteNetworkInterfaceType(cellLp.getInterfaceName(), |
| 6346 | TYPE_MOBILE); |
| 6347 | reset(mBatteryStatsService); |
| 6348 | |
| 6349 | final LinkProperties wifiLp = new LinkProperties(); |
| 6350 | wifiLp.setInterfaceName("wifi0"); |
| 6351 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI, wifiLp); |
| 6352 | mWiFiNetworkAgent.connect(true); |
| 6353 | waitForIdle(); |
| 6354 | verify(mBatteryStatsService).noteNetworkInterfaceType(wifiLp.getInterfaceName(), |
| 6355 | TYPE_WIFI); |
| 6356 | reset(mBatteryStatsService); |
| 6357 | |
Chalard Jean | 587758b | 2019-11-29 16:41:50 +0900 | [diff] [blame] | 6358 | mCellNetworkAgent.disconnect(); |
| 6359 | |
| 6360 | cellLp.setInterfaceName("wifi0"); |
| 6361 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR, cellLp); |
| 6362 | mCellNetworkAgent.connect(true); |
| 6363 | waitForIdle(); |
| 6364 | verify(mBatteryStatsService).noteNetworkInterfaceType(cellLp.getInterfaceName(), |
| 6365 | TYPE_MOBILE); |
| 6366 | } |
| 6367 | |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6368 | /** |
| 6369 | * Make simulated InterfaceConfig for Nat464Xlat to query clat lower layer info. |
| 6370 | */ |
| 6371 | private InterfaceConfiguration getClatInterfaceConfig(LinkAddress la) { |
| 6372 | InterfaceConfiguration cfg = new InterfaceConfiguration(); |
| 6373 | cfg.setHardwareAddress("11:22:33:44:55:66"); |
| 6374 | cfg.setLinkAddress(la); |
| 6375 | return cfg; |
| 6376 | } |
| 6377 | |
| 6378 | /** |
| 6379 | * Make expected stack link properties, copied from Nat464Xlat. |
| 6380 | */ |
| 6381 | private LinkProperties makeClatLinkProperties(LinkAddress la) { |
| 6382 | LinkAddress clatAddress = la; |
| 6383 | LinkProperties stacked = new LinkProperties(); |
| 6384 | stacked.setInterfaceName(CLAT_PREFIX + MOBILE_IFNAME); |
| 6385 | RouteInfo ipv4Default = new RouteInfo( |
| 6386 | new LinkAddress(Inet4Address.ANY, 0), |
| 6387 | clatAddress.getAddress(), CLAT_PREFIX + MOBILE_IFNAME); |
| 6388 | stacked.addRoute(ipv4Default); |
| 6389 | stacked.addLinkAddress(clatAddress); |
| 6390 | return stacked; |
| 6391 | } |
| 6392 | |
| 6393 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6394 | public void testStackedLinkProperties() throws Exception { |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6395 | final LinkAddress myIpv4 = new LinkAddress("1.2.3.4/24"); |
| 6396 | final LinkAddress myIpv6 = new LinkAddress("2001:db8:1::1/64"); |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6397 | final String kNat64PrefixString = "2001:db8:64:64:64:64::"; |
| 6398 | final IpPrefix kNat64Prefix = new IpPrefix(InetAddress.getByName(kNat64PrefixString), 96); |
Lorenzo Colitti | 756273e | 2020-04-16 16:49:33 +0000 | [diff] [blame] | 6399 | final String kOtherNat64PrefixString = "64:ff9b::"; |
| 6400 | final IpPrefix kOtherNat64Prefix = new IpPrefix( |
| 6401 | InetAddress.getByName(kOtherNat64PrefixString), 96); |
Automerger Merge Worker | d9375e4 | 2020-02-27 01:16:45 +0000 | [diff] [blame] | 6402 | final RouteInfo defaultRoute = new RouteInfo((IpPrefix) null, myIpv6.getAddress(), |
| 6403 | MOBILE_IFNAME); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 6404 | final RouteInfo ipv6Subnet = new RouteInfo(myIpv6, null, MOBILE_IFNAME); |
| 6405 | final RouteInfo ipv4Subnet = new RouteInfo(myIpv4, null, MOBILE_IFNAME); |
Automerger Merge Worker | d9375e4 | 2020-02-27 01:16:45 +0000 | [diff] [blame] | 6406 | final RouteInfo stackedDefault = new RouteInfo((IpPrefix) null, myIpv4.getAddress(), |
| 6407 | CLAT_PREFIX + MOBILE_IFNAME); |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6408 | |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6409 | final NetworkRequest networkRequest = new NetworkRequest.Builder() |
| 6410 | .addTransportType(TRANSPORT_CELLULAR) |
| 6411 | .addCapability(NET_CAPABILITY_INTERNET) |
| 6412 | .build(); |
| 6413 | final TestNetworkCallback networkCallback = new TestNetworkCallback(); |
| 6414 | mCm.registerNetworkCallback(networkRequest, networkCallback); |
| 6415 | |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6416 | // Prepare ipv6 only link properties. |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6417 | final LinkProperties cellLp = new LinkProperties(); |
| 6418 | cellLp.setInterfaceName(MOBILE_IFNAME); |
| 6419 | cellLp.addLinkAddress(myIpv6); |
Automerger Merge Worker | d9375e4 | 2020-02-27 01:16:45 +0000 | [diff] [blame] | 6420 | cellLp.addRoute(defaultRoute); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 6421 | cellLp.addRoute(ipv6Subnet); |
Chalard Jean | bbaa33e | 2019-11-19 19:03:53 +0900 | [diff] [blame] | 6422 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR, cellLp); |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6423 | reset(mNetworkManagementService); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 6424 | reset(mMockDnsResolver); |
Luke Huang | a24d5d8 | 2019-04-09 18:41:49 +0800 | [diff] [blame] | 6425 | reset(mMockNetd); |
Chalard Jean | 587758b | 2019-11-29 16:41:50 +0900 | [diff] [blame] | 6426 | reset(mBatteryStatsService); |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6427 | |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6428 | // Connect with ipv6 link properties. Expect prefix discovery to be started. |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6429 | mCellNetworkAgent.connect(true); |
Chalard Jean | bbaa33e | 2019-11-19 19:03:53 +0900 | [diff] [blame] | 6430 | final int cellNetId = mCellNetworkAgent.getNetwork().netId; |
Chalard Jean | 587758b | 2019-11-29 16:41:50 +0900 | [diff] [blame] | 6431 | waitForIdle(); |
Luke Huang | a24d5d8 | 2019-04-09 18:41:49 +0800 | [diff] [blame] | 6432 | |
| 6433 | verify(mMockNetd, times(1)).networkCreatePhysical(eq(cellNetId), anyInt()); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 6434 | assertRoutesAdded(cellNetId, ipv6Subnet, defaultRoute); |
Luke Huang | a24d5d8 | 2019-04-09 18:41:49 +0800 | [diff] [blame] | 6435 | verify(mMockDnsResolver, times(1)).createNetworkCache(eq(cellNetId)); |
Chalard Jean | 587758b | 2019-11-29 16:41:50 +0900 | [diff] [blame] | 6436 | verify(mBatteryStatsService).noteNetworkInterfaceType(cellLp.getInterfaceName(), |
| 6437 | TYPE_MOBILE); |
Luke Huang | a24d5d8 | 2019-04-09 18:41:49 +0800 | [diff] [blame] | 6438 | |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6439 | networkCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 6440 | verify(mMockDnsResolver, times(1)).startPrefix64Discovery(cellNetId); |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6441 | |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6442 | // Switching default network updates TCP buffer sizes. |
| 6443 | verifyTcpBufferSizeChange(ConnectivityService.DEFAULT_TCP_BUFFER_SIZES); |
| 6444 | |
| 6445 | // Add an IPv4 address. Expect prefix discovery to be stopped. Netd doesn't tell us that |
| 6446 | // the NAT64 prefix was removed because one was never discovered. |
| 6447 | cellLp.addLinkAddress(myIpv4); |
| 6448 | mCellNetworkAgent.sendLinkProperties(cellLp); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6449 | networkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, mCellNetworkAgent); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 6450 | assertRoutesAdded(cellNetId, ipv4Subnet); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 6451 | verify(mMockDnsResolver, times(1)).stopPrefix64Discovery(cellNetId); |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 6452 | verify(mMockDnsResolver, atLeastOnce()).setResolverConfiguration(any()); |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6453 | |
Chalard Jean | 587758b | 2019-11-29 16:41:50 +0900 | [diff] [blame] | 6454 | // Make sure BatteryStats was not told about any v4- interfaces, as none should have |
| 6455 | // come online yet. |
| 6456 | waitForIdle(); |
| 6457 | verify(mBatteryStatsService, never()).noteNetworkInterfaceType(startsWith("v4-"), anyInt()); |
| 6458 | |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6459 | verifyNoMoreInteractions(mMockNetd); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 6460 | verifyNoMoreInteractions(mMockDnsResolver); |
Automerger Merge Worker | d9375e4 | 2020-02-27 01:16:45 +0000 | [diff] [blame] | 6461 | reset(mNetworkManagementService); |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6462 | reset(mMockNetd); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 6463 | reset(mMockDnsResolver); |
Automerger Merge Worker | d9375e4 | 2020-02-27 01:16:45 +0000 | [diff] [blame] | 6464 | when(mNetworkManagementService.getInterfaceConfig(CLAT_PREFIX + MOBILE_IFNAME)) |
| 6465 | .thenReturn(getClatInterfaceConfig(myIpv4)); |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6466 | |
| 6467 | // Remove IPv4 address. Expect prefix discovery to be started again. |
| 6468 | cellLp.removeLinkAddress(myIpv4); |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6469 | mCellNetworkAgent.sendLinkProperties(cellLp); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6470 | networkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, mCellNetworkAgent); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 6471 | verify(mMockDnsResolver, times(1)).startPrefix64Discovery(cellNetId); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 6472 | assertRoutesRemoved(cellNetId, ipv4Subnet); |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6473 | |
| 6474 | // When NAT64 prefix discovery succeeds, LinkProperties are updated and clatd is started. |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6475 | Nat464Xlat clat = getNat464Xlat(mCellNetworkAgent); |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6476 | assertNull(mCm.getLinkProperties(mCellNetworkAgent.getNetwork()).getNat64Prefix()); |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6477 | mService.mNetdEventCallback.onNat64PrefixEvent(cellNetId, true /* added */, |
| 6478 | kNat64PrefixString, 96); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 6479 | LinkProperties lpBeforeClat = networkCallback.expectCallback( |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6480 | CallbackEntry.LINK_PROPERTIES_CHANGED, mCellNetworkAgent).getLp(); |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6481 | assertEquals(0, lpBeforeClat.getStackedLinks().size()); |
| 6482 | assertEquals(kNat64Prefix, lpBeforeClat.getNat64Prefix()); |
| 6483 | verify(mMockNetd, times(1)).clatdStart(MOBILE_IFNAME, kNat64Prefix.toString()); |
| 6484 | |
| 6485 | // Clat iface comes up. Expect stacked link to be added. |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6486 | clat.interfaceLinkStateChanged(CLAT_PREFIX + MOBILE_IFNAME, true); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6487 | networkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, mCellNetworkAgent); |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6488 | List<LinkProperties> stackedLps = mCm.getLinkProperties(mCellNetworkAgent.getNetwork()) |
| 6489 | .getStackedLinks(); |
| 6490 | assertEquals(makeClatLinkProperties(myIpv4), stackedLps.get(0)); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 6491 | assertRoutesAdded(cellNetId, stackedDefault); |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6492 | |
| 6493 | // Change trivial linkproperties and see if stacked link is preserved. |
| 6494 | cellLp.addDnsServer(InetAddress.getByName("8.8.8.8")); |
| 6495 | mCellNetworkAgent.sendLinkProperties(cellLp); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6496 | networkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, mCellNetworkAgent); |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6497 | |
| 6498 | List<LinkProperties> stackedLpsAfterChange = |
| 6499 | mCm.getLinkProperties(mCellNetworkAgent.getNetwork()).getStackedLinks(); |
| 6500 | assertNotEquals(stackedLpsAfterChange, Collections.EMPTY_LIST); |
| 6501 | assertEquals(makeClatLinkProperties(myIpv4), stackedLpsAfterChange.get(0)); |
| 6502 | |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 6503 | verify(mMockDnsResolver, times(1)).setResolverConfiguration( |
waynema | 1351684 | 2019-03-12 18:13:49 +0800 | [diff] [blame] | 6504 | mResolverParamsParcelCaptor.capture()); |
| 6505 | ResolverParamsParcel resolvrParams = mResolverParamsParcelCaptor.getValue(); |
| 6506 | assertEquals(1, resolvrParams.servers.length); |
| 6507 | assertTrue(ArrayUtils.contains(resolvrParams.servers, "8.8.8.8")); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 6508 | |
Chalard Jean | bbaa33e | 2019-11-19 19:03:53 +0900 | [diff] [blame] | 6509 | for (final LinkProperties stackedLp : stackedLpsAfterChange) { |
| 6510 | verify(mBatteryStatsService).noteNetworkInterfaceType(stackedLp.getInterfaceName(), |
| 6511 | TYPE_MOBILE); |
| 6512 | } |
Lorenzo Colitti | d86407b | 2020-03-18 07:52:25 +0000 | [diff] [blame] | 6513 | reset(mMockNetd); |
Chalard Jean | 587758b | 2019-11-29 16:41:50 +0900 | [diff] [blame] | 6514 | |
Lorenzo Colitti | 756273e | 2020-04-16 16:49:33 +0000 | [diff] [blame] | 6515 | // Change the NAT64 prefix without first removing it. |
| 6516 | // Expect clatd to be stopped and started with the new prefix. |
| 6517 | mService.mNetdEventCallback.onNat64PrefixEvent(cellNetId, true /* added */, |
| 6518 | kOtherNat64PrefixString, 96); |
| 6519 | networkCallback.expectLinkPropertiesThat(mCellNetworkAgent, |
| 6520 | (lp) -> lp.getStackedLinks().size() == 0); |
| 6521 | verify(mMockNetd, times(1)).clatdStop(MOBILE_IFNAME); |
| 6522 | assertRoutesRemoved(cellNetId, stackedDefault); |
| 6523 | |
| 6524 | verify(mMockNetd, times(1)).clatdStart(MOBILE_IFNAME, kOtherNat64Prefix.toString()); |
| 6525 | networkCallback.expectLinkPropertiesThat(mCellNetworkAgent, |
| 6526 | (lp) -> lp.getNat64Prefix().equals(kOtherNat64Prefix)); |
| 6527 | clat.interfaceLinkStateChanged(CLAT_PREFIX + MOBILE_IFNAME, true); |
| 6528 | networkCallback.expectLinkPropertiesThat(mCellNetworkAgent, |
| 6529 | (lp) -> lp.getStackedLinks().size() == 1); |
| 6530 | assertRoutesAdded(cellNetId, stackedDefault); |
| 6531 | reset(mMockNetd); |
| 6532 | |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6533 | // Add ipv4 address, expect that clatd and prefix discovery are stopped and stacked |
| 6534 | // linkproperties are cleaned up. |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6535 | cellLp.addLinkAddress(myIpv4); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 6536 | cellLp.addRoute(ipv4Subnet); |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6537 | mCellNetworkAgent.sendLinkProperties(cellLp); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6538 | networkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, mCellNetworkAgent); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 6539 | assertRoutesAdded(cellNetId, ipv4Subnet); |
Lorenzo Colitti | 9307ca2 | 2019-01-12 01:54:23 +0900 | [diff] [blame] | 6540 | verify(mMockNetd, times(1)).clatdStop(MOBILE_IFNAME); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 6541 | verify(mMockDnsResolver, times(1)).stopPrefix64Discovery(cellNetId); |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6542 | |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6543 | // As soon as stop is called, the linkproperties lose the stacked interface. |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6544 | networkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, mCellNetworkAgent); |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6545 | LinkProperties actualLpAfterIpv4 = mCm.getLinkProperties(mCellNetworkAgent.getNetwork()); |
| 6546 | LinkProperties expected = new LinkProperties(cellLp); |
Lorenzo Colitti | 756273e | 2020-04-16 16:49:33 +0000 | [diff] [blame] | 6547 | expected.setNat64Prefix(kOtherNat64Prefix); |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6548 | assertEquals(expected, actualLpAfterIpv4); |
| 6549 | assertEquals(0, actualLpAfterIpv4.getStackedLinks().size()); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 6550 | assertRoutesRemoved(cellNetId, stackedDefault); |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6551 | |
| 6552 | // The interface removed callback happens but has no effect after stop is called. |
| 6553 | clat.interfaceRemoved(CLAT_PREFIX + MOBILE_IFNAME); |
| 6554 | networkCallback.assertNoCallback(); |
| 6555 | |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6556 | verifyNoMoreInteractions(mMockNetd); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 6557 | verifyNoMoreInteractions(mMockDnsResolver); |
Automerger Merge Worker | d9375e4 | 2020-02-27 01:16:45 +0000 | [diff] [blame] | 6558 | reset(mNetworkManagementService); |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6559 | reset(mMockNetd); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 6560 | reset(mMockDnsResolver); |
Automerger Merge Worker | d9375e4 | 2020-02-27 01:16:45 +0000 | [diff] [blame] | 6561 | when(mNetworkManagementService.getInterfaceConfig(CLAT_PREFIX + MOBILE_IFNAME)) |
| 6562 | .thenReturn(getClatInterfaceConfig(myIpv4)); |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6563 | |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6564 | // Stopping prefix discovery causes netd to tell us that the NAT64 prefix is gone. |
| 6565 | mService.mNetdEventCallback.onNat64PrefixEvent(cellNetId, false /* added */, |
Lorenzo Colitti | 756273e | 2020-04-16 16:49:33 +0000 | [diff] [blame] | 6566 | kOtherNat64PrefixString, 96); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 6567 | networkCallback.expectLinkPropertiesThat(mCellNetworkAgent, |
| 6568 | (lp) -> lp.getNat64Prefix() == null); |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6569 | |
| 6570 | // Remove IPv4 address and expect prefix discovery and clatd to be started again. |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6571 | cellLp.removeLinkAddress(myIpv4); |
| 6572 | cellLp.removeRoute(new RouteInfo(myIpv4, null, MOBILE_IFNAME)); |
| 6573 | cellLp.removeDnsServer(InetAddress.getByName("8.8.8.8")); |
| 6574 | mCellNetworkAgent.sendLinkProperties(cellLp); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6575 | networkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, mCellNetworkAgent); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 6576 | assertRoutesRemoved(cellNetId, ipv4Subnet); // Directly-connected routes auto-added. |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 6577 | verify(mMockDnsResolver, times(1)).startPrefix64Discovery(cellNetId); |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6578 | mService.mNetdEventCallback.onNat64PrefixEvent(cellNetId, true /* added */, |
| 6579 | kNat64PrefixString, 96); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6580 | networkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, mCellNetworkAgent); |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6581 | verify(mMockNetd, times(1)).clatdStart(MOBILE_IFNAME, kNat64Prefix.toString()); |
| 6582 | |
| 6583 | // Clat iface comes up. Expect stacked link to be added. |
| 6584 | clat.interfaceLinkStateChanged(CLAT_PREFIX + MOBILE_IFNAME, true); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 6585 | networkCallback.expectLinkPropertiesThat(mCellNetworkAgent, |
| 6586 | (lp) -> lp.getStackedLinks().size() == 1 && lp.getNat64Prefix() != null); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 6587 | assertRoutesAdded(cellNetId, stackedDefault); |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6588 | |
| 6589 | // NAT64 prefix is removed. Expect that clat is stopped. |
Lorenzo Colitti | d593e29 | 2019-02-19 13:21:56 +0900 | [diff] [blame] | 6590 | mService.mNetdEventCallback.onNat64PrefixEvent(cellNetId, false /* added */, |
| 6591 | kNat64PrefixString, 96); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 6592 | networkCallback.expectLinkPropertiesThat(mCellNetworkAgent, |
| 6593 | (lp) -> lp.getStackedLinks().size() == 0 && lp.getNat64Prefix() == null); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 6594 | assertRoutesRemoved(cellNetId, ipv4Subnet, stackedDefault); |
| 6595 | |
| 6596 | // Stop has no effect because clat is already stopped. |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6597 | verify(mMockNetd, times(1)).clatdStop(MOBILE_IFNAME); |
Chalard Jean | 6f4216f | 2019-06-05 01:40:32 +0900 | [diff] [blame] | 6598 | networkCallback.expectLinkPropertiesThat(mCellNetworkAgent, |
| 6599 | (lp) -> lp.getStackedLinks().size() == 0); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 6600 | verifyNoMoreInteractions(mMockNetd); |
Lorenzo Colitti | 6998fa8 | 2019-01-08 10:04:25 +0900 | [diff] [blame] | 6601 | |
| 6602 | // Clean up. |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6603 | mCellNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6604 | networkCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
Lorenzo Colitti | 2412c13 | 2019-01-22 09:47:54 +0900 | [diff] [blame] | 6605 | networkCallback.assertNoCallback(); |
junyulai | 4a192e2 | 2018-06-13 15:00:37 +0800 | [diff] [blame] | 6606 | mCm.unregisterNetworkCallback(networkCallback); |
| 6607 | } |
Chiachang Wang | a609304 | 2018-09-28 22:42:48 +0800 | [diff] [blame] | 6608 | |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6609 | private void expectNat64PrefixChange(TestableNetworkCallback callback, |
| 6610 | TestNetworkAgentWrapper agent, IpPrefix prefix) { |
| 6611 | callback.expectLinkPropertiesThat(agent, x -> Objects.equals(x.getNat64Prefix(), prefix)); |
| 6612 | } |
| 6613 | |
| 6614 | @Test |
| 6615 | public void testNat64PrefixMultipleSources() throws Exception { |
| 6616 | final String iface = "wlan0"; |
| 6617 | final String pref64FromRaStr = "64:ff9b::"; |
| 6618 | final String pref64FromDnsStr = "2001:db8:64::"; |
| 6619 | final IpPrefix pref64FromRa = new IpPrefix(InetAddress.getByName(pref64FromRaStr), 96); |
| 6620 | final IpPrefix pref64FromDns = new IpPrefix(InetAddress.getByName(pref64FromDnsStr), 96); |
| 6621 | final IpPrefix newPref64FromRa = new IpPrefix("2001:db8:64:64:64:64::/96"); |
| 6622 | |
| 6623 | final NetworkRequest request = new NetworkRequest.Builder() |
| 6624 | .addCapability(NET_CAPABILITY_INTERNET) |
| 6625 | .build(); |
| 6626 | final TestNetworkCallback callback = new TestNetworkCallback(); |
| 6627 | mCm.registerNetworkCallback(request, callback); |
| 6628 | |
| 6629 | final LinkProperties baseLp = new LinkProperties(); |
| 6630 | baseLp.setInterfaceName(iface); |
| 6631 | baseLp.addLinkAddress(new LinkAddress("2001:db8:1::1/64")); |
| 6632 | baseLp.addDnsServer(InetAddress.getByName("2001:4860:4860::6464")); |
| 6633 | |
| 6634 | reset(mMockNetd, mMockDnsResolver); |
| 6635 | InOrder inOrder = inOrder(mMockNetd, mMockDnsResolver); |
| 6636 | |
| 6637 | // If a network already has a NAT64 prefix on connect, clatd is started immediately and |
| 6638 | // prefix discovery is never started. |
| 6639 | LinkProperties lp = new LinkProperties(baseLp); |
| 6640 | lp.setNat64Prefix(pref64FromRa); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6641 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI, lp); |
| 6642 | mWiFiNetworkAgent.connect(false); |
| 6643 | final Network network = mWiFiNetworkAgent.getNetwork(); |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6644 | int netId = network.getNetId(); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6645 | callback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6646 | inOrder.verify(mMockNetd).clatdStart(iface, pref64FromRa.toString()); |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6647 | inOrder.verify(mMockDnsResolver).setPrefix64(netId, pref64FromRa.toString()); |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6648 | inOrder.verify(mMockDnsResolver, never()).startPrefix64Discovery(netId); |
| 6649 | callback.assertNoCallback(); |
| 6650 | assertEquals(pref64FromRa, mCm.getLinkProperties(network).getNat64Prefix()); |
| 6651 | |
| 6652 | // If the RA prefix is withdrawn, clatd is stopped and prefix discovery is started. |
| 6653 | lp.setNat64Prefix(null); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6654 | mWiFiNetworkAgent.sendLinkProperties(lp); |
| 6655 | expectNat64PrefixChange(callback, mWiFiNetworkAgent, null); |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6656 | inOrder.verify(mMockNetd).clatdStop(iface); |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6657 | inOrder.verify(mMockDnsResolver).setPrefix64(netId, ""); |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6658 | inOrder.verify(mMockDnsResolver).startPrefix64Discovery(netId); |
| 6659 | |
Lorenzo Colitti | 0d020c6 | 2020-04-20 11:38:11 +0000 | [diff] [blame] | 6660 | // If the RA prefix appears while DNS discovery is in progress, discovery is stopped and |
| 6661 | // clatd is started with the prefix from the RA. |
| 6662 | lp.setNat64Prefix(pref64FromRa); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6663 | mWiFiNetworkAgent.sendLinkProperties(lp); |
| 6664 | expectNat64PrefixChange(callback, mWiFiNetworkAgent, pref64FromRa); |
Lorenzo Colitti | 0d020c6 | 2020-04-20 11:38:11 +0000 | [diff] [blame] | 6665 | inOrder.verify(mMockNetd).clatdStart(iface, pref64FromRa.toString()); |
| 6666 | inOrder.verify(mMockDnsResolver).stopPrefix64Discovery(netId); |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6667 | inOrder.verify(mMockDnsResolver).setPrefix64(netId, pref64FromRa.toString()); |
Lorenzo Colitti | 0d020c6 | 2020-04-20 11:38:11 +0000 | [diff] [blame] | 6668 | |
| 6669 | // Withdraw the RA prefix so we can test the case where an RA prefix appears after DNS |
| 6670 | // discovery has succeeded. |
| 6671 | lp.setNat64Prefix(null); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6672 | mWiFiNetworkAgent.sendLinkProperties(lp); |
| 6673 | expectNat64PrefixChange(callback, mWiFiNetworkAgent, null); |
Lorenzo Colitti | 0d020c6 | 2020-04-20 11:38:11 +0000 | [diff] [blame] | 6674 | inOrder.verify(mMockNetd).clatdStop(iface); |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6675 | inOrder.verify(mMockDnsResolver).setPrefix64(netId, ""); |
Lorenzo Colitti | 0d020c6 | 2020-04-20 11:38:11 +0000 | [diff] [blame] | 6676 | inOrder.verify(mMockDnsResolver).startPrefix64Discovery(netId); |
| 6677 | |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6678 | mService.mNetdEventCallback.onNat64PrefixEvent(netId, true /* added */, |
| 6679 | pref64FromDnsStr, 96); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6680 | expectNat64PrefixChange(callback, mWiFiNetworkAgent, pref64FromDns); |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6681 | inOrder.verify(mMockNetd).clatdStart(iface, pref64FromDns.toString()); |
| 6682 | |
Lorenzo Colitti | fbf205a | 2020-05-24 11:30:55 +0000 | [diff] [blame] | 6683 | // If an RA advertises the same prefix that was discovered by DNS, nothing happens: prefix |
| 6684 | // discovery is not stopped, and there are no callbacks. |
| 6685 | lp.setNat64Prefix(pref64FromDns); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6686 | mWiFiNetworkAgent.sendLinkProperties(lp); |
Lorenzo Colitti | fbf205a | 2020-05-24 11:30:55 +0000 | [diff] [blame] | 6687 | callback.assertNoCallback(); |
| 6688 | inOrder.verify(mMockNetd, never()).clatdStop(iface); |
| 6689 | inOrder.verify(mMockNetd, never()).clatdStart(eq(iface), anyString()); |
| 6690 | inOrder.verify(mMockDnsResolver, never()).stopPrefix64Discovery(netId); |
| 6691 | inOrder.verify(mMockDnsResolver, never()).startPrefix64Discovery(netId); |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6692 | inOrder.verify(mMockDnsResolver, never()).setPrefix64(eq(netId), anyString()); |
Lorenzo Colitti | fbf205a | 2020-05-24 11:30:55 +0000 | [diff] [blame] | 6693 | |
| 6694 | // If the RA is later withdrawn, nothing happens again. |
| 6695 | lp.setNat64Prefix(null); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6696 | mWiFiNetworkAgent.sendLinkProperties(lp); |
Lorenzo Colitti | fbf205a | 2020-05-24 11:30:55 +0000 | [diff] [blame] | 6697 | callback.assertNoCallback(); |
| 6698 | inOrder.verify(mMockNetd, never()).clatdStop(iface); |
| 6699 | inOrder.verify(mMockNetd, never()).clatdStart(eq(iface), anyString()); |
| 6700 | inOrder.verify(mMockDnsResolver, never()).stopPrefix64Discovery(netId); |
| 6701 | inOrder.verify(mMockDnsResolver, never()).startPrefix64Discovery(netId); |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6702 | inOrder.verify(mMockDnsResolver, never()).setPrefix64(eq(netId), anyString()); |
Lorenzo Colitti | fbf205a | 2020-05-24 11:30:55 +0000 | [diff] [blame] | 6703 | |
| 6704 | // If the RA prefix changes, clatd is restarted and prefix discovery is stopped. |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6705 | lp.setNat64Prefix(pref64FromRa); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6706 | mWiFiNetworkAgent.sendLinkProperties(lp); |
| 6707 | expectNat64PrefixChange(callback, mWiFiNetworkAgent, pref64FromRa); |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6708 | inOrder.verify(mMockNetd).clatdStop(iface); |
| 6709 | inOrder.verify(mMockDnsResolver).stopPrefix64Discovery(netId); |
Lorenzo Colitti | fbf205a | 2020-05-24 11:30:55 +0000 | [diff] [blame] | 6710 | |
| 6711 | // Stopping prefix discovery results in a prefix removed notification. |
| 6712 | mService.mNetdEventCallback.onNat64PrefixEvent(netId, false /* added */, |
| 6713 | pref64FromDnsStr, 96); |
| 6714 | |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6715 | inOrder.verify(mMockNetd).clatdStart(iface, pref64FromRa.toString()); |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6716 | inOrder.verify(mMockDnsResolver).setPrefix64(netId, pref64FromRa.toString()); |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6717 | inOrder.verify(mMockDnsResolver, never()).startPrefix64Discovery(netId); |
| 6718 | |
| 6719 | // If the RA prefix changes, clatd is restarted and prefix discovery is not started. |
| 6720 | lp.setNat64Prefix(newPref64FromRa); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6721 | mWiFiNetworkAgent.sendLinkProperties(lp); |
| 6722 | expectNat64PrefixChange(callback, mWiFiNetworkAgent, newPref64FromRa); |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6723 | inOrder.verify(mMockNetd).clatdStop(iface); |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6724 | inOrder.verify(mMockDnsResolver).setPrefix64(netId, ""); |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6725 | inOrder.verify(mMockNetd).clatdStart(iface, newPref64FromRa.toString()); |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6726 | inOrder.verify(mMockDnsResolver).setPrefix64(netId, newPref64FromRa.toString()); |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6727 | inOrder.verify(mMockDnsResolver, never()).stopPrefix64Discovery(netId); |
| 6728 | inOrder.verify(mMockDnsResolver, never()).startPrefix64Discovery(netId); |
| 6729 | |
| 6730 | // If the RA prefix changes to the same value, nothing happens. |
| 6731 | lp.setNat64Prefix(newPref64FromRa); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6732 | mWiFiNetworkAgent.sendLinkProperties(lp); |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6733 | callback.assertNoCallback(); |
| 6734 | assertEquals(newPref64FromRa, mCm.getLinkProperties(network).getNat64Prefix()); |
| 6735 | inOrder.verify(mMockNetd, never()).clatdStop(iface); |
| 6736 | inOrder.verify(mMockNetd, never()).clatdStart(eq(iface), anyString()); |
| 6737 | inOrder.verify(mMockDnsResolver, never()).stopPrefix64Discovery(netId); |
| 6738 | inOrder.verify(mMockDnsResolver, never()).startPrefix64Discovery(netId); |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6739 | inOrder.verify(mMockDnsResolver, never()).setPrefix64(eq(netId), anyString()); |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6740 | |
| 6741 | // The transition between no prefix and DNS prefix is tested in testStackedLinkProperties. |
| 6742 | |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6743 | // If the same prefix is learned first by DNS and then by RA, and clat is later stopped, |
| 6744 | // (e.g., because the network disconnects) setPrefix64(netid, "") is never called. |
| 6745 | lp.setNat64Prefix(null); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6746 | mWiFiNetworkAgent.sendLinkProperties(lp); |
| 6747 | expectNat64PrefixChange(callback, mWiFiNetworkAgent, null); |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6748 | inOrder.verify(mMockNetd).clatdStop(iface); |
| 6749 | inOrder.verify(mMockDnsResolver).setPrefix64(netId, ""); |
| 6750 | inOrder.verify(mMockDnsResolver).startPrefix64Discovery(netId); |
| 6751 | mService.mNetdEventCallback.onNat64PrefixEvent(netId, true /* added */, |
| 6752 | pref64FromDnsStr, 96); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6753 | expectNat64PrefixChange(callback, mWiFiNetworkAgent, pref64FromDns); |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6754 | inOrder.verify(mMockNetd).clatdStart(iface, pref64FromDns.toString()); |
| 6755 | inOrder.verify(mMockDnsResolver, never()).setPrefix64(eq(netId), any()); |
| 6756 | |
| 6757 | lp.setNat64Prefix(pref64FromDns); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6758 | mWiFiNetworkAgent.sendLinkProperties(lp); |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6759 | callback.assertNoCallback(); |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6760 | inOrder.verify(mMockNetd, never()).clatdStop(iface); |
| 6761 | inOrder.verify(mMockNetd, never()).clatdStart(eq(iface), anyString()); |
| 6762 | inOrder.verify(mMockDnsResolver, never()).stopPrefix64Discovery(netId); |
| 6763 | inOrder.verify(mMockDnsResolver, never()).startPrefix64Discovery(netId); |
| 6764 | inOrder.verify(mMockDnsResolver, never()).setPrefix64(eq(netId), anyString()); |
| 6765 | |
| 6766 | // When tearing down a network, clat state is only updated after CALLBACK_LOST is fired, but |
| 6767 | // before CONNECTIVITY_ACTION is sent. Wait for CONNECTIVITY_ACTION before verifying that |
| 6768 | // clat has been stopped, or the test will be flaky. |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6769 | ExpectedBroadcast b = expectConnectivityAction(TYPE_WIFI, DetailedState.DISCONNECTED); |
| 6770 | mWiFiNetworkAgent.disconnect(); |
| 6771 | callback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
| 6772 | b.expectBroadcast(); |
Lorenzo Colitti | 7f7171c | 2020-05-26 10:13:17 +0000 | [diff] [blame] | 6773 | |
| 6774 | inOrder.verify(mMockNetd).clatdStop(iface); |
| 6775 | inOrder.verify(mMockDnsResolver).stopPrefix64Discovery(netId); |
| 6776 | inOrder.verify(mMockDnsResolver, never()).setPrefix64(eq(netId), anyString()); |
| 6777 | |
Lorenzo Colitti | 1cb345e | 2020-04-20 11:37:18 +0000 | [diff] [blame] | 6778 | mCm.unregisterNetworkCallback(callback); |
| 6779 | } |
| 6780 | |
Chiachang Wang | a609304 | 2018-09-28 22:42:48 +0800 | [diff] [blame] | 6781 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6782 | public void testDataActivityTracking() throws Exception { |
Chiachang Wang | a609304 | 2018-09-28 22:42:48 +0800 | [diff] [blame] | 6783 | final TestNetworkCallback networkCallback = new TestNetworkCallback(); |
| 6784 | final NetworkRequest networkRequest = new NetworkRequest.Builder() |
| 6785 | .addCapability(NET_CAPABILITY_INTERNET) |
| 6786 | .build(); |
| 6787 | mCm.registerNetworkCallback(networkRequest, networkCallback); |
| 6788 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6789 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Chiachang Wang | a609304 | 2018-09-28 22:42:48 +0800 | [diff] [blame] | 6790 | final LinkProperties cellLp = new LinkProperties(); |
| 6791 | cellLp.setInterfaceName(MOBILE_IFNAME); |
| 6792 | mCellNetworkAgent.sendLinkProperties(cellLp); |
| 6793 | reset(mNetworkManagementService); |
| 6794 | mCellNetworkAgent.connect(true); |
| 6795 | networkCallback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
| 6796 | verify(mNetworkManagementService, times(1)).addIdleTimer(eq(MOBILE_IFNAME), anyInt(), |
| 6797 | eq(ConnectivityManager.TYPE_MOBILE)); |
| 6798 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6799 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Chiachang Wang | a609304 | 2018-09-28 22:42:48 +0800 | [diff] [blame] | 6800 | final LinkProperties wifiLp = new LinkProperties(); |
| 6801 | wifiLp.setInterfaceName(WIFI_IFNAME); |
| 6802 | mWiFiNetworkAgent.sendLinkProperties(wifiLp); |
| 6803 | |
| 6804 | // Network switch |
| 6805 | reset(mNetworkManagementService); |
| 6806 | mWiFiNetworkAgent.connect(true); |
| 6807 | networkCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6808 | networkCallback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Chiachang Wang | a609304 | 2018-09-28 22:42:48 +0800 | [diff] [blame] | 6809 | networkCallback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
| 6810 | verify(mNetworkManagementService, times(1)).addIdleTimer(eq(WIFI_IFNAME), anyInt(), |
| 6811 | eq(ConnectivityManager.TYPE_WIFI)); |
| 6812 | verify(mNetworkManagementService, times(1)).removeIdleTimer(eq(MOBILE_IFNAME)); |
| 6813 | |
| 6814 | // Disconnect wifi and switch back to cell |
| 6815 | reset(mNetworkManagementService); |
| 6816 | mWiFiNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6817 | networkCallback.expectCallback(CallbackEntry.LOST, mWiFiNetworkAgent); |
Chiachang Wang | a609304 | 2018-09-28 22:42:48 +0800 | [diff] [blame] | 6818 | assertNoCallbacks(networkCallback); |
| 6819 | verify(mNetworkManagementService, times(1)).removeIdleTimer(eq(WIFI_IFNAME)); |
| 6820 | verify(mNetworkManagementService, times(1)).addIdleTimer(eq(MOBILE_IFNAME), anyInt(), |
| 6821 | eq(ConnectivityManager.TYPE_MOBILE)); |
| 6822 | |
| 6823 | // reconnect wifi |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6824 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Chiachang Wang | a609304 | 2018-09-28 22:42:48 +0800 | [diff] [blame] | 6825 | wifiLp.setInterfaceName(WIFI_IFNAME); |
| 6826 | mWiFiNetworkAgent.sendLinkProperties(wifiLp); |
| 6827 | mWiFiNetworkAgent.connect(true); |
| 6828 | networkCallback.expectAvailableCallbacksUnvalidated(mWiFiNetworkAgent); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6829 | networkCallback.expectCallback(CallbackEntry.LOSING, mCellNetworkAgent); |
Chiachang Wang | a609304 | 2018-09-28 22:42:48 +0800 | [diff] [blame] | 6830 | networkCallback.expectCapabilitiesWith(NET_CAPABILITY_VALIDATED, mWiFiNetworkAgent); |
| 6831 | |
| 6832 | // Disconnect cell |
| 6833 | reset(mNetworkManagementService); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 6834 | reset(mMockNetd); |
Chiachang Wang | a609304 | 2018-09-28 22:42:48 +0800 | [diff] [blame] | 6835 | mCellNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6836 | networkCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
Chiachang Wang | a609304 | 2018-09-28 22:42:48 +0800 | [diff] [blame] | 6837 | // LOST callback is triggered earlier than removing idle timer. Broadcast should also be |
| 6838 | // sent as network being switched. Ensure rule removal for cell will not be triggered |
| 6839 | // unexpectedly before network being removed. |
| 6840 | waitForIdle(); |
| 6841 | verify(mNetworkManagementService, times(0)).removeIdleTimer(eq(MOBILE_IFNAME)); |
Luke Huang | 6591477 | 2019-03-16 00:31:46 +0800 | [diff] [blame] | 6842 | verify(mMockNetd, times(1)).networkDestroy(eq(mCellNetworkAgent.getNetwork().netId)); |
| 6843 | verify(mMockDnsResolver, times(1)) |
Luke Huang | a24d5d8 | 2019-04-09 18:41:49 +0800 | [diff] [blame] | 6844 | .destroyNetworkCache(eq(mCellNetworkAgent.getNetwork().netId)); |
Chiachang Wang | a609304 | 2018-09-28 22:42:48 +0800 | [diff] [blame] | 6845 | |
| 6846 | // Disconnect wifi |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6847 | ExpectedBroadcast b = expectConnectivityAction(TYPE_WIFI, DetailedState.DISCONNECTED); |
Chiachang Wang | a609304 | 2018-09-28 22:42:48 +0800 | [diff] [blame] | 6848 | reset(mNetworkManagementService); |
| 6849 | mWiFiNetworkAgent.disconnect(); |
Lorenzo Colitti | d590e33e | 2021-01-06 01:36:07 +0900 | [diff] [blame] | 6850 | b.expectBroadcast(); |
Chiachang Wang | a609304 | 2018-09-28 22:42:48 +0800 | [diff] [blame] | 6851 | verify(mNetworkManagementService, times(1)).removeIdleTimer(eq(WIFI_IFNAME)); |
| 6852 | |
| 6853 | // Clean up |
| 6854 | mCm.unregisterNetworkCallback(networkCallback); |
| 6855 | } |
Chenbo Feng | 7f14dbc | 2018-11-08 17:36:21 -0800 | [diff] [blame] | 6856 | |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6857 | private void verifyTcpBufferSizeChange(String tcpBufferSizes) throws Exception { |
Chenbo Feng | 7f14dbc | 2018-11-08 17:36:21 -0800 | [diff] [blame] | 6858 | String[] values = tcpBufferSizes.split(","); |
| 6859 | String rmemValues = String.join(" ", values[0], values[1], values[2]); |
| 6860 | String wmemValues = String.join(" ", values[3], values[4], values[5]); |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6861 | verify(mMockNetd, atLeastOnce()).setTcpRWmemorySize(rmemValues, wmemValues); |
Chenbo Feng | 7f14dbc | 2018-11-08 17:36:21 -0800 | [diff] [blame] | 6862 | reset(mMockNetd); |
| 6863 | } |
| 6864 | |
| 6865 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6866 | public void testTcpBufferReset() throws Exception { |
Lorenzo Colitti | f56ff04 | 2019-02-25 10:56:06 +0900 | [diff] [blame] | 6867 | final String testTcpBufferSizes = "1,2,3,4,5,6"; |
paulhu | 66269b3 | 2019-08-30 19:24:36 +0800 | [diff] [blame] | 6868 | final NetworkRequest networkRequest = new NetworkRequest.Builder() |
| 6869 | .addTransportType(TRANSPORT_CELLULAR) |
| 6870 | .addCapability(NET_CAPABILITY_INTERNET) |
| 6871 | .build(); |
| 6872 | final TestNetworkCallback networkCallback = new TestNetworkCallback(); |
| 6873 | mCm.registerNetworkCallback(networkRequest, networkCallback); |
Lorenzo Colitti | f56ff04 | 2019-02-25 10:56:06 +0900 | [diff] [blame] | 6874 | |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6875 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
Chenbo Feng | 7f14dbc | 2018-11-08 17:36:21 -0800 | [diff] [blame] | 6876 | reset(mMockNetd); |
Lorenzo Colitti | f56ff04 | 2019-02-25 10:56:06 +0900 | [diff] [blame] | 6877 | // Switching default network updates TCP buffer sizes. |
Chenbo Feng | 7f14dbc | 2018-11-08 17:36:21 -0800 | [diff] [blame] | 6878 | mCellNetworkAgent.connect(false); |
paulhu | 66269b3 | 2019-08-30 19:24:36 +0800 | [diff] [blame] | 6879 | networkCallback.expectAvailableCallbacksUnvalidated(mCellNetworkAgent); |
Chenbo Feng | 7f14dbc | 2018-11-08 17:36:21 -0800 | [diff] [blame] | 6880 | verifyTcpBufferSizeChange(ConnectivityService.DEFAULT_TCP_BUFFER_SIZES); |
| 6881 | |
| 6882 | // Change link Properties should have updated tcp buffer size. |
| 6883 | LinkProperties lp = new LinkProperties(); |
Lorenzo Colitti | f56ff04 | 2019-02-25 10:56:06 +0900 | [diff] [blame] | 6884 | lp.setTcpBufferSizes(testTcpBufferSizes); |
Chenbo Feng | 7f14dbc | 2018-11-08 17:36:21 -0800 | [diff] [blame] | 6885 | mCellNetworkAgent.sendLinkProperties(lp); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6886 | networkCallback.expectCallback(CallbackEntry.LINK_PROPERTIES_CHANGED, mCellNetworkAgent); |
Lorenzo Colitti | f56ff04 | 2019-02-25 10:56:06 +0900 | [diff] [blame] | 6887 | verifyTcpBufferSizeChange(testTcpBufferSizes); |
paulhu | 66269b3 | 2019-08-30 19:24:36 +0800 | [diff] [blame] | 6888 | |
| 6889 | // Clean up. |
| 6890 | mCellNetworkAgent.disconnect(); |
Chalard Jean | 059c426 | 2019-09-30 17:51:12 +0900 | [diff] [blame] | 6891 | networkCallback.expectCallback(CallbackEntry.LOST, mCellNetworkAgent); |
paulhu | 66269b3 | 2019-08-30 19:24:36 +0800 | [diff] [blame] | 6892 | networkCallback.assertNoCallback(); |
| 6893 | mCm.unregisterNetworkCallback(networkCallback); |
Chenbo Feng | 7f14dbc | 2018-11-08 17:36:21 -0800 | [diff] [blame] | 6894 | } |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 6895 | |
| 6896 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6897 | public void testGetGlobalProxyForNetwork() throws Exception { |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 6898 | final ProxyInfo testProxyInfo = ProxyInfo.buildDirectProxy("test", 8888); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6899 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 6900 | final Network wifiNetwork = mWiFiNetworkAgent.getNetwork(); |
| 6901 | when(mService.mProxyTracker.getGlobalProxy()).thenReturn(testProxyInfo); |
| 6902 | assertEquals(testProxyInfo, mService.getProxyForNetwork(wifiNetwork)); |
| 6903 | } |
| 6904 | |
| 6905 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6906 | public void testGetProxyForActiveNetwork() throws Exception { |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 6907 | final ProxyInfo testProxyInfo = ProxyInfo.buildDirectProxy("test", 8888); |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6908 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 6909 | mWiFiNetworkAgent.connect(true); |
| 6910 | waitForIdle(); |
| 6911 | assertNull(mService.getProxyForNetwork(null)); |
| 6912 | |
| 6913 | final LinkProperties testLinkProperties = new LinkProperties(); |
| 6914 | testLinkProperties.setHttpProxy(testProxyInfo); |
| 6915 | |
| 6916 | mWiFiNetworkAgent.sendLinkProperties(testLinkProperties); |
| 6917 | waitForIdle(); |
| 6918 | |
| 6919 | assertEquals(testProxyInfo, mService.getProxyForNetwork(null)); |
| 6920 | } |
| 6921 | |
| 6922 | @Test |
Chalard Jean | e7b2475 | 2019-06-20 16:01:19 +0900 | [diff] [blame] | 6923 | public void testGetProxyForVPN() throws Exception { |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 6924 | final ProxyInfo testProxyInfo = ProxyInfo.buildDirectProxy("test", 8888); |
| 6925 | |
| 6926 | // Set up a WiFi network with no proxy |
Remi NGUYEN VAN | 95dc87e | 2019-06-13 16:12:02 +0900 | [diff] [blame] | 6927 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 6928 | mWiFiNetworkAgent.connect(true); |
| 6929 | waitForIdle(); |
| 6930 | assertNull(mService.getProxyForNetwork(null)); |
| 6931 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6932 | // Connect a VPN network with a proxy. |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 6933 | LinkProperties testLinkProperties = new LinkProperties(); |
| 6934 | testLinkProperties.setHttpProxy(testProxyInfo); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6935 | mMockVpn.establishForMyUid(testLinkProperties); |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 6936 | |
| 6937 | // Test that the VPN network returns a proxy, and the WiFi does not. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6938 | assertEquals(testProxyInfo, mService.getProxyForNetwork(mMockVpn.getNetwork())); |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 6939 | assertEquals(testProxyInfo, mService.getProxyForNetwork(null)); |
| 6940 | assertNull(mService.getProxyForNetwork(mWiFiNetworkAgent.getNetwork())); |
| 6941 | |
| 6942 | // Test that the VPN network returns no proxy when it is set to null. |
| 6943 | testLinkProperties.setHttpProxy(null); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6944 | mMockVpn.sendLinkProperties(testLinkProperties); |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 6945 | waitForIdle(); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6946 | assertNull(mService.getProxyForNetwork(mMockVpn.getNetwork())); |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 6947 | assertNull(mService.getProxyForNetwork(null)); |
| 6948 | |
| 6949 | // Set WiFi proxy and check that the vpn proxy is still null. |
| 6950 | testLinkProperties.setHttpProxy(testProxyInfo); |
| 6951 | mWiFiNetworkAgent.sendLinkProperties(testLinkProperties); |
| 6952 | waitForIdle(); |
| 6953 | assertNull(mService.getProxyForNetwork(null)); |
| 6954 | |
| 6955 | // Disconnect from VPN and check that the active network, which is now the WiFi, has the |
| 6956 | // correct proxy setting. |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6957 | mMockVpn.disconnect(); |
Irina Dumitrescu | 044a436 | 2018-12-05 16:19:47 +0000 | [diff] [blame] | 6958 | waitForIdle(); |
| 6959 | assertEquals(mWiFiNetworkAgent.getNetwork(), mCm.getActiveNetwork()); |
| 6960 | assertEquals(testProxyInfo, mService.getProxyForNetwork(mWiFiNetworkAgent.getNetwork())); |
| 6961 | assertEquals(testProxyInfo, mService.getProxyForNetwork(null)); |
| 6962 | } |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 6963 | |
| 6964 | @Test |
| 6965 | public void testFullyRoutedVpnResultsInInterfaceFilteringRules() throws Exception { |
| 6966 | LinkProperties lp = new LinkProperties(); |
| 6967 | lp.setInterfaceName("tun0"); |
| 6968 | lp.addRoute(new RouteInfo(new IpPrefix(Inet4Address.ANY, 0), null)); |
Lorenzo Colitti | 5ccee0c | 2020-04-02 04:50:41 +0000 | [diff] [blame] | 6969 | lp.addRoute(new RouteInfo(new IpPrefix(Inet6Address.ANY, 0), RTN_UNREACHABLE)); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 6970 | // The uid range needs to cover the test app so the network is visible to it. |
| 6971 | final Set<UidRange> vpnRange = Collections.singleton(UidRange.createForUser(VPN_USER)); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6972 | mMockVpn.establish(lp, VPN_UID, vpnRange); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 6973 | |
| 6974 | // Connected VPN should have interface rules set up. There are two expected invocations, |
| 6975 | // one during VPN uid update, one during VPN LinkProperties update |
| 6976 | ArgumentCaptor<int[]> uidCaptor = ArgumentCaptor.forClass(int[].class); |
| 6977 | verify(mMockNetd, times(2)).firewallAddUidInterfaceRules(eq("tun0"), uidCaptor.capture()); |
| 6978 | assertContainsExactly(uidCaptor.getAllValues().get(0), APP1_UID, APP2_UID); |
| 6979 | assertContainsExactly(uidCaptor.getAllValues().get(1), APP1_UID, APP2_UID); |
| 6980 | assertTrue(mService.mPermissionMonitor.getVpnUidRanges("tun0").equals(vpnRange)); |
| 6981 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6982 | mMockVpn.disconnect(); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 6983 | waitForIdle(); |
| 6984 | |
| 6985 | // Disconnected VPN should have interface rules removed |
| 6986 | verify(mMockNetd).firewallRemoveUidInterfaceRules(uidCaptor.capture()); |
| 6987 | assertContainsExactly(uidCaptor.getValue(), APP1_UID, APP2_UID); |
| 6988 | assertNull(mService.mPermissionMonitor.getVpnUidRanges("tun0")); |
| 6989 | } |
| 6990 | |
| 6991 | @Test |
| 6992 | public void testLegacyVpnDoesNotResultInInterfaceFilteringRule() throws Exception { |
| 6993 | LinkProperties lp = new LinkProperties(); |
| 6994 | lp.setInterfaceName("tun0"); |
Lorenzo Colitti | 5ccee0c | 2020-04-02 04:50:41 +0000 | [diff] [blame] | 6995 | lp.addRoute(new RouteInfo(new IpPrefix(Inet6Address.ANY, 0), null)); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 6996 | lp.addRoute(new RouteInfo(new IpPrefix(Inet4Address.ANY, 0), null)); |
| 6997 | // The uid range needs to cover the test app so the network is visible to it. |
| 6998 | final Set<UidRange> vpnRange = Collections.singleton(UidRange.createForUser(VPN_USER)); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 6999 | mMockVpn.establish(lp, Process.SYSTEM_UID, vpnRange); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7000 | |
| 7001 | // Legacy VPN should not have interface rules set up |
| 7002 | verify(mMockNetd, never()).firewallAddUidInterfaceRules(any(), any()); |
| 7003 | } |
| 7004 | |
Lorenzo Colitti | 8574c9b | 2019-04-12 19:50:22 +0900 | [diff] [blame] | 7005 | @Test |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7006 | public void testLocalIpv4OnlyVpnDoesNotResultInInterfaceFilteringRule() |
| 7007 | throws Exception { |
| 7008 | LinkProperties lp = new LinkProperties(); |
| 7009 | lp.setInterfaceName("tun0"); |
| 7010 | lp.addRoute(new RouteInfo(new IpPrefix("192.0.2.0/24"), null, "tun0")); |
| 7011 | lp.addRoute(new RouteInfo(new IpPrefix(Inet6Address.ANY, 0), RTN_UNREACHABLE)); |
| 7012 | // The uid range needs to cover the test app so the network is visible to it. |
| 7013 | final Set<UidRange> vpnRange = Collections.singleton(UidRange.createForUser(VPN_USER)); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 7014 | mMockVpn.establish(lp, Process.SYSTEM_UID, vpnRange); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7015 | |
| 7016 | // IPv6 unreachable route should not be misinterpreted as a default route |
| 7017 | verify(mMockNetd, never()).firewallAddUidInterfaceRules(any(), any()); |
| 7018 | } |
| 7019 | |
| 7020 | @Test |
| 7021 | public void testVpnHandoverChangesInterfaceFilteringRule() throws Exception { |
| 7022 | LinkProperties lp = new LinkProperties(); |
| 7023 | lp.setInterfaceName("tun0"); |
| 7024 | lp.addRoute(new RouteInfo(new IpPrefix(Inet4Address.ANY, 0), null)); |
Lorenzo Colitti | 5ccee0c | 2020-04-02 04:50:41 +0000 | [diff] [blame] | 7025 | lp.addRoute(new RouteInfo(new IpPrefix(Inet6Address.ANY, 0), null)); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7026 | // The uid range needs to cover the test app so the network is visible to it. |
| 7027 | final Set<UidRange> vpnRange = Collections.singleton(UidRange.createForUser(VPN_USER)); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 7028 | mMockVpn.establish(lp, VPN_UID, vpnRange); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7029 | |
| 7030 | // Connected VPN should have interface rules set up. There are two expected invocations, |
| 7031 | // one during VPN uid update, one during VPN LinkProperties update |
| 7032 | ArgumentCaptor<int[]> uidCaptor = ArgumentCaptor.forClass(int[].class); |
| 7033 | verify(mMockNetd, times(2)).firewallAddUidInterfaceRules(eq("tun0"), uidCaptor.capture()); |
| 7034 | assertContainsExactly(uidCaptor.getAllValues().get(0), APP1_UID, APP2_UID); |
| 7035 | assertContainsExactly(uidCaptor.getAllValues().get(1), APP1_UID, APP2_UID); |
| 7036 | |
| 7037 | reset(mMockNetd); |
| 7038 | InOrder inOrder = inOrder(mMockNetd); |
| 7039 | lp.setInterfaceName("tun1"); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 7040 | mMockVpn.sendLinkProperties(lp); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7041 | waitForIdle(); |
| 7042 | // VPN handover (switch to a new interface) should result in rules being updated (old rules |
| 7043 | // removed first, then new rules added) |
| 7044 | inOrder.verify(mMockNetd).firewallRemoveUidInterfaceRules(uidCaptor.capture()); |
| 7045 | assertContainsExactly(uidCaptor.getValue(), APP1_UID, APP2_UID); |
| 7046 | inOrder.verify(mMockNetd).firewallAddUidInterfaceRules(eq("tun1"), uidCaptor.capture()); |
| 7047 | assertContainsExactly(uidCaptor.getValue(), APP1_UID, APP2_UID); |
| 7048 | |
| 7049 | reset(mMockNetd); |
| 7050 | lp = new LinkProperties(); |
| 7051 | lp.setInterfaceName("tun1"); |
| 7052 | lp.addRoute(new RouteInfo(new IpPrefix("192.0.2.0/24"), null, "tun1")); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 7053 | mMockVpn.sendLinkProperties(lp); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7054 | waitForIdle(); |
| 7055 | // VPN not routing everything should no longer have interface filtering rules |
| 7056 | verify(mMockNetd).firewallRemoveUidInterfaceRules(uidCaptor.capture()); |
| 7057 | assertContainsExactly(uidCaptor.getValue(), APP1_UID, APP2_UID); |
| 7058 | |
| 7059 | reset(mMockNetd); |
| 7060 | lp = new LinkProperties(); |
| 7061 | lp.setInterfaceName("tun1"); |
Lorenzo Colitti | 5ccee0c | 2020-04-02 04:50:41 +0000 | [diff] [blame] | 7062 | lp.addRoute(new RouteInfo(new IpPrefix(Inet4Address.ANY, 0), RTN_UNREACHABLE)); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7063 | lp.addRoute(new RouteInfo(new IpPrefix(Inet6Address.ANY, 0), null)); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 7064 | mMockVpn.sendLinkProperties(lp); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7065 | waitForIdle(); |
| 7066 | // Back to routing all IPv6 traffic should have filtering rules |
| 7067 | verify(mMockNetd).firewallAddUidInterfaceRules(eq("tun1"), uidCaptor.capture()); |
| 7068 | assertContainsExactly(uidCaptor.getValue(), APP1_UID, APP2_UID); |
| 7069 | } |
| 7070 | |
| 7071 | @Test |
| 7072 | public void testUidUpdateChangesInterfaceFilteringRule() throws Exception { |
| 7073 | LinkProperties lp = new LinkProperties(); |
| 7074 | lp.setInterfaceName("tun0"); |
Lorenzo Colitti | 5ccee0c | 2020-04-02 04:50:41 +0000 | [diff] [blame] | 7075 | lp.addRoute(new RouteInfo(new IpPrefix(Inet4Address.ANY, 0), RTN_UNREACHABLE)); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7076 | lp.addRoute(new RouteInfo(new IpPrefix(Inet6Address.ANY, 0), null)); |
| 7077 | // The uid range needs to cover the test app so the network is visible to it. |
| 7078 | final UidRange vpnRange = UidRange.createForUser(VPN_USER); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 7079 | mMockVpn.establish(lp, VPN_UID, Collections.singleton(vpnRange)); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7080 | |
| 7081 | reset(mMockNetd); |
| 7082 | InOrder inOrder = inOrder(mMockNetd); |
| 7083 | |
| 7084 | // Update to new range which is old range minus APP1, i.e. only APP2 |
| 7085 | final Set<UidRange> newRanges = new HashSet<>(Arrays.asList( |
| 7086 | new UidRange(vpnRange.start, APP1_UID - 1), |
| 7087 | new UidRange(APP1_UID + 1, vpnRange.stop))); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 7088 | mMockVpn.setUids(newRanges); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7089 | waitForIdle(); |
| 7090 | |
| 7091 | ArgumentCaptor<int[]> uidCaptor = ArgumentCaptor.forClass(int[].class); |
| 7092 | // Verify old rules are removed before new rules are added |
| 7093 | inOrder.verify(mMockNetd).firewallRemoveUidInterfaceRules(uidCaptor.capture()); |
| 7094 | assertContainsExactly(uidCaptor.getValue(), APP1_UID, APP2_UID); |
| 7095 | inOrder.verify(mMockNetd).firewallAddUidInterfaceRules(eq("tun0"), uidCaptor.capture()); |
| 7096 | assertContainsExactly(uidCaptor.getValue(), APP2_UID); |
| 7097 | } |
| 7098 | |
Valentin Iftime | c86ebba | 2019-09-24 13:32:13 +0200 | [diff] [blame] | 7099 | @Test |
| 7100 | public void testLinkPropertiesWithWakeOnLanForActiveNetwork() throws Exception { |
| 7101 | mWiFiNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_WIFI); |
| 7102 | |
| 7103 | LinkProperties wifiLp = new LinkProperties(); |
| 7104 | wifiLp.setInterfaceName(WIFI_WOL_IFNAME); |
| 7105 | wifiLp.setWakeOnLanSupported(false); |
| 7106 | |
| 7107 | // Default network switch should update ifaces. |
| 7108 | mWiFiNetworkAgent.connect(false); |
| 7109 | mWiFiNetworkAgent.sendLinkProperties(wifiLp); |
| 7110 | waitForIdle(); |
| 7111 | |
| 7112 | // ConnectivityService should have changed the WakeOnLanSupported to true |
| 7113 | wifiLp.setWakeOnLanSupported(true); |
| 7114 | assertEquals(wifiLp, mService.getActiveLinkProperties()); |
| 7115 | } |
| 7116 | |
Chiachang Wang | 4d2791b | 2020-06-16 01:02:52 +0000 | [diff] [blame] | 7117 | @Test |
| 7118 | public void testLegacyExtraInfoSentToNetworkMonitor() throws Exception { |
| 7119 | class TestNetworkAgent extends NetworkAgent { |
| 7120 | TestNetworkAgent(Context context, Looper looper, NetworkAgentConfig config) { |
| 7121 | super(context, looper, "MockAgent", new NetworkCapabilities(), |
| 7122 | new LinkProperties(), 40 , config, null /* provider */); |
| 7123 | } |
| 7124 | } |
| 7125 | final NetworkAgent naNoExtraInfo = new TestNetworkAgent( |
| 7126 | mServiceContext, mCsHandlerThread.getLooper(), new NetworkAgentConfig()); |
| 7127 | naNoExtraInfo.register(); |
| 7128 | verify(mNetworkStack).makeNetworkMonitor(any(), isNull(String.class), any()); |
| 7129 | naNoExtraInfo.unregister(); |
| 7130 | |
| 7131 | reset(mNetworkStack); |
| 7132 | final NetworkAgentConfig config = |
| 7133 | new NetworkAgentConfig.Builder().setLegacyExtraInfo("legacyinfo").build(); |
| 7134 | final NetworkAgent naExtraInfo = new TestNetworkAgent( |
| 7135 | mServiceContext, mCsHandlerThread.getLooper(), config); |
| 7136 | naExtraInfo.register(); |
| 7137 | verify(mNetworkStack).makeNetworkMonitor(any(), eq("legacyinfo"), any()); |
| 7138 | naExtraInfo.unregister(); |
| 7139 | } |
| 7140 | |
Qingxi Li | 9c5d8b9 | 2020-01-08 12:51:49 -0800 | [diff] [blame] | 7141 | private void setupLocationPermissions( |
| 7142 | int targetSdk, boolean locationToggle, String op, String perm) throws Exception { |
| 7143 | final ApplicationInfo applicationInfo = new ApplicationInfo(); |
| 7144 | applicationInfo.targetSdkVersion = targetSdk; |
| 7145 | when(mPackageManager.getApplicationInfoAsUser(anyString(), anyInt(), any())) |
| 7146 | .thenReturn(applicationInfo); |
| 7147 | |
| 7148 | when(mLocationManager.isLocationEnabledForUser(any())).thenReturn(locationToggle); |
| 7149 | |
| 7150 | if (op != null) { |
| 7151 | when(mAppOpsManager.noteOp(eq(op), eq(Process.myUid()), eq(mContext.getPackageName()))) |
| 7152 | .thenReturn(AppOpsManager.MODE_ALLOWED); |
| 7153 | } |
| 7154 | |
| 7155 | if (perm != null) { |
| 7156 | mServiceContext.setPermission(perm, PERMISSION_GRANTED); |
| 7157 | } |
| 7158 | } |
| 7159 | |
| 7160 | private int getOwnerUidNetCapsForCallerPermission(int ownerUid, int callerUid) { |
| 7161 | final NetworkCapabilities netCap = new NetworkCapabilities().setOwnerUid(ownerUid); |
| 7162 | |
| 7163 | return mService |
| 7164 | .maybeSanitizeLocationInfoForCaller(netCap, callerUid, mContext.getPackageName()) |
| 7165 | .getOwnerUid(); |
| 7166 | } |
| 7167 | |
Qingxi Li | 7cf0662 | 2020-01-17 17:54:27 -0800 | [diff] [blame] | 7168 | @Test |
Qingxi Li | 9c5d8b9 | 2020-01-08 12:51:49 -0800 | [diff] [blame] | 7169 | public void testMaybeSanitizeLocationInfoForCallerWithFineLocationAfterQ() throws Exception { |
| 7170 | setupLocationPermissions(Build.VERSION_CODES.Q, true, AppOpsManager.OPSTR_FINE_LOCATION, |
| 7171 | Manifest.permission.ACCESS_FINE_LOCATION); |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7172 | |
Qingxi Li | 9c5d8b9 | 2020-01-08 12:51:49 -0800 | [diff] [blame] | 7173 | final int myUid = Process.myUid(); |
| 7174 | assertEquals(myUid, getOwnerUidNetCapsForCallerPermission(myUid, myUid)); |
| 7175 | } |
Qingxi Li | 7cf0662 | 2020-01-17 17:54:27 -0800 | [diff] [blame] | 7176 | |
Qingxi Li | 9c5d8b9 | 2020-01-08 12:51:49 -0800 | [diff] [blame] | 7177 | @Test |
| 7178 | public void testMaybeSanitizeLocationInfoForCallerWithCoarseLocationPreQ() throws Exception { |
| 7179 | setupLocationPermissions(Build.VERSION_CODES.P, true, AppOpsManager.OPSTR_COARSE_LOCATION, |
| 7180 | Manifest.permission.ACCESS_COARSE_LOCATION); |
| 7181 | |
| 7182 | final int myUid = Process.myUid(); |
| 7183 | assertEquals(myUid, getOwnerUidNetCapsForCallerPermission(myUid, myUid)); |
| 7184 | } |
| 7185 | |
| 7186 | @Test |
| 7187 | public void testMaybeSanitizeLocationInfoForCallerLocationOff() throws Exception { |
| 7188 | // Test that even with fine location permission, and UIDs matching, the UID is sanitized. |
| 7189 | setupLocationPermissions(Build.VERSION_CODES.Q, false, AppOpsManager.OPSTR_FINE_LOCATION, |
| 7190 | Manifest.permission.ACCESS_FINE_LOCATION); |
| 7191 | |
| 7192 | final int myUid = Process.myUid(); |
| 7193 | assertEquals(Process.INVALID_UID, getOwnerUidNetCapsForCallerPermission(myUid, myUid)); |
| 7194 | } |
| 7195 | |
| 7196 | @Test |
| 7197 | public void testMaybeSanitizeLocationInfoForCallerWrongUid() throws Exception { |
| 7198 | // Test that even with fine location permission, not being the owner leads to sanitization. |
| 7199 | setupLocationPermissions(Build.VERSION_CODES.Q, true, AppOpsManager.OPSTR_FINE_LOCATION, |
| 7200 | Manifest.permission.ACCESS_FINE_LOCATION); |
| 7201 | |
| 7202 | final int myUid = Process.myUid(); |
| 7203 | assertEquals(Process.INVALID_UID, getOwnerUidNetCapsForCallerPermission(myUid + 1, myUid)); |
| 7204 | } |
| 7205 | |
| 7206 | @Test |
| 7207 | public void testMaybeSanitizeLocationInfoForCallerWithCoarseLocationAfterQ() throws Exception { |
| 7208 | // Test that not having fine location permission leads to sanitization. |
| 7209 | setupLocationPermissions(Build.VERSION_CODES.Q, true, AppOpsManager.OPSTR_COARSE_LOCATION, |
| 7210 | Manifest.permission.ACCESS_COARSE_LOCATION); |
| 7211 | |
| 7212 | // Test that without the location permission, the owner field is sanitized. |
| 7213 | final int myUid = Process.myUid(); |
| 7214 | assertEquals(Process.INVALID_UID, getOwnerUidNetCapsForCallerPermission(myUid, myUid)); |
| 7215 | } |
| 7216 | |
| 7217 | @Test |
| 7218 | public void testMaybeSanitizeLocationInfoForCallerWithoutLocationPermission() throws Exception { |
| 7219 | setupLocationPermissions(Build.VERSION_CODES.Q, true, null /* op */, null /* perm */); |
| 7220 | |
| 7221 | // Test that without the location permission, the owner field is sanitized. |
| 7222 | final int myUid = Process.myUid(); |
| 7223 | assertEquals(Process.INVALID_UID, getOwnerUidNetCapsForCallerPermission(myUid, myUid)); |
Qingxi Li | 7cf0662 | 2020-01-17 17:54:27 -0800 | [diff] [blame] | 7224 | } |
| 7225 | |
Benedict Wong | 5d50ce8 | 2020-01-20 22:14:59 -0800 | [diff] [blame] | 7226 | private void setupConnectionOwnerUid(int vpnOwnerUid, @VpnManager.VpnType int vpnType) |
| 7227 | throws Exception { |
| 7228 | final Set<UidRange> vpnRange = Collections.singleton(UidRange.createForUser(VPN_USER)); |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 7229 | mMockVpn.establish(new LinkProperties(), vpnOwnerUid, vpnRange); |
Benedict Wong | 5d50ce8 | 2020-01-20 22:14:59 -0800 | [diff] [blame] | 7230 | mMockVpn.setVpnType(vpnType); |
| 7231 | |
| 7232 | final VpnInfo vpnInfo = new VpnInfo(); |
| 7233 | vpnInfo.ownerUid = vpnOwnerUid; |
| 7234 | mMockVpn.setVpnInfo(vpnInfo); |
| 7235 | } |
| 7236 | |
| 7237 | private void setupConnectionOwnerUidAsVpnApp(int vpnOwnerUid, @VpnManager.VpnType int vpnType) |
| 7238 | throws Exception { |
| 7239 | setupConnectionOwnerUid(vpnOwnerUid, vpnType); |
| 7240 | |
| 7241 | // Test as VPN app |
| 7242 | mServiceContext.setPermission(android.Manifest.permission.NETWORK_STACK, PERMISSION_DENIED); |
| 7243 | mServiceContext.setPermission( |
| 7244 | NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK, PERMISSION_DENIED); |
| 7245 | } |
| 7246 | |
| 7247 | private ConnectionInfo getTestConnectionInfo() throws Exception { |
| 7248 | return new ConnectionInfo( |
| 7249 | IPPROTO_TCP, |
| 7250 | new InetSocketAddress(InetAddresses.parseNumericAddress("1.2.3.4"), 1234), |
| 7251 | new InetSocketAddress(InetAddresses.parseNumericAddress("2.3.4.5"), 2345)); |
| 7252 | } |
| 7253 | |
| 7254 | @Test |
| 7255 | public void testGetConnectionOwnerUidPlatformVpn() throws Exception { |
| 7256 | final int myUid = Process.myUid(); |
| 7257 | setupConnectionOwnerUidAsVpnApp(myUid, VpnManager.TYPE_VPN_PLATFORM); |
| 7258 | |
| 7259 | try { |
| 7260 | mService.getConnectionOwnerUid(getTestConnectionInfo()); |
| 7261 | fail("Expected SecurityException for non-VpnService app"); |
| 7262 | } catch (SecurityException expected) { |
| 7263 | } |
| 7264 | } |
| 7265 | |
| 7266 | @Test |
| 7267 | public void testGetConnectionOwnerUidVpnServiceWrongUser() throws Exception { |
| 7268 | final int myUid = Process.myUid(); |
| 7269 | setupConnectionOwnerUidAsVpnApp(myUid + 1, VpnManager.TYPE_VPN_SERVICE); |
| 7270 | |
| 7271 | try { |
| 7272 | mService.getConnectionOwnerUid(getTestConnectionInfo()); |
| 7273 | fail("Expected SecurityException for non-VpnService app"); |
| 7274 | } catch (SecurityException expected) { |
| 7275 | } |
| 7276 | } |
| 7277 | |
| 7278 | @Test |
| 7279 | public void testGetConnectionOwnerUidVpnServiceDoesNotThrow() throws Exception { |
| 7280 | final int myUid = Process.myUid(); |
| 7281 | setupConnectionOwnerUidAsVpnApp(myUid, VpnManager.TYPE_VPN_SERVICE); |
| 7282 | |
| 7283 | // TODO: Test the returned UID |
| 7284 | mService.getConnectionOwnerUid(getTestConnectionInfo()); |
| 7285 | } |
| 7286 | |
| 7287 | @Test |
| 7288 | public void testGetConnectionOwnerUidVpnServiceNetworkStackDoesNotThrow() throws Exception { |
| 7289 | final int myUid = Process.myUid(); |
| 7290 | setupConnectionOwnerUid(myUid, VpnManager.TYPE_VPN_SERVICE); |
| 7291 | mServiceContext.setPermission( |
| 7292 | android.Manifest.permission.NETWORK_STACK, PERMISSION_GRANTED); |
| 7293 | |
| 7294 | // TODO: Test the returned UID |
| 7295 | mService.getConnectionOwnerUid(getTestConnectionInfo()); |
| 7296 | } |
| 7297 | |
| 7298 | @Test |
| 7299 | public void testGetConnectionOwnerUidVpnServiceMainlineNetworkStackDoesNotThrow() |
| 7300 | throws Exception { |
| 7301 | final int myUid = Process.myUid(); |
| 7302 | setupConnectionOwnerUid(myUid, VpnManager.TYPE_VPN_SERVICE); |
| 7303 | mServiceContext.setPermission( |
| 7304 | NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK, PERMISSION_GRANTED); |
| 7305 | |
| 7306 | // TODO: Test the returned UID |
| 7307 | mService.getConnectionOwnerUid(getTestConnectionInfo()); |
| 7308 | } |
| 7309 | |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7310 | private static PackageInfo buildPackageInfo(boolean hasSystemPermission, int uid) { |
| 7311 | final PackageInfo packageInfo = new PackageInfo(); |
paulhu | 86e23eb | 2019-11-05 18:05:05 +0800 | [diff] [blame] | 7312 | if (hasSystemPermission) { |
| 7313 | packageInfo.requestedPermissions = new String[] { |
| 7314 | CHANGE_NETWORK_STATE, CONNECTIVITY_USE_RESTRICTED_NETWORKS }; |
| 7315 | packageInfo.requestedPermissionsFlags = new int[] { |
| 7316 | REQUESTED_PERMISSION_GRANTED, REQUESTED_PERMISSION_GRANTED }; |
| 7317 | } else { |
| 7318 | packageInfo.requestedPermissions = new String[0]; |
| 7319 | } |
Lorenzo Colitti | 4c9f954 | 2019-04-12 10:48:06 +0000 | [diff] [blame] | 7320 | packageInfo.applicationInfo = new ApplicationInfo(); |
| 7321 | packageInfo.applicationInfo.privateFlags = 0; |
| 7322 | packageInfo.applicationInfo.uid = UserHandle.getUid(UserHandle.USER_SYSTEM, |
| 7323 | UserHandle.getAppId(uid)); |
| 7324 | return packageInfo; |
| 7325 | } |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 7326 | |
| 7327 | @Test |
| 7328 | public void testRegisterConnectivityDiagnosticsCallbackInvalidRequest() throws Exception { |
| 7329 | final NetworkRequest request = |
| 7330 | new NetworkRequest( |
| 7331 | new NetworkCapabilities(), TYPE_ETHERNET, 0, NetworkRequest.Type.NONE); |
| 7332 | try { |
| 7333 | mService.registerConnectivityDiagnosticsCallback( |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7334 | mConnectivityDiagnosticsCallback, request, mContext.getPackageName()); |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 7335 | fail("registerConnectivityDiagnosticsCallback should throw on invalid NetworkRequest"); |
| 7336 | } catch (IllegalArgumentException expected) { |
| 7337 | } |
| 7338 | } |
| 7339 | |
Lorenzo Colitti | d86407b | 2020-03-18 07:52:25 +0000 | [diff] [blame] | 7340 | private void assertRouteInfoParcelMatches(RouteInfo route, RouteInfoParcel parcel) { |
| 7341 | assertEquals(route.getDestination().toString(), parcel.destination); |
| 7342 | assertEquals(route.getInterface(), parcel.ifName); |
| 7343 | assertEquals(route.getMtu(), parcel.mtu); |
| 7344 | |
| 7345 | switch (route.getType()) { |
| 7346 | case RouteInfo.RTN_UNICAST: |
| 7347 | if (route.hasGateway()) { |
| 7348 | assertEquals(route.getGateway().getHostAddress(), parcel.nextHop); |
| 7349 | } else { |
| 7350 | assertEquals(INetd.NEXTHOP_NONE, parcel.nextHop); |
| 7351 | } |
| 7352 | break; |
| 7353 | case RouteInfo.RTN_UNREACHABLE: |
| 7354 | assertEquals(INetd.NEXTHOP_UNREACHABLE, parcel.nextHop); |
| 7355 | break; |
| 7356 | case RouteInfo.RTN_THROW: |
| 7357 | assertEquals(INetd.NEXTHOP_THROW, parcel.nextHop); |
| 7358 | break; |
| 7359 | default: |
| 7360 | assertEquals(INetd.NEXTHOP_NONE, parcel.nextHop); |
| 7361 | break; |
| 7362 | } |
| 7363 | } |
| 7364 | |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 7365 | private void assertRoutesAdded(int netId, RouteInfo... routes) throws Exception { |
Lorenzo Colitti | d86407b | 2020-03-18 07:52:25 +0000 | [diff] [blame] | 7366 | ArgumentCaptor<RouteInfoParcel> captor = ArgumentCaptor.forClass(RouteInfoParcel.class); |
| 7367 | verify(mMockNetd, times(routes.length)).networkAddRouteParcel(eq(netId), captor.capture()); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 7368 | for (int i = 0; i < routes.length; i++) { |
Lorenzo Colitti | d86407b | 2020-03-18 07:52:25 +0000 | [diff] [blame] | 7369 | assertRouteInfoParcelMatches(routes[i], captor.getAllValues().get(i)); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 7370 | } |
| 7371 | } |
| 7372 | |
| 7373 | private void assertRoutesRemoved(int netId, RouteInfo... routes) throws Exception { |
Lorenzo Colitti | d86407b | 2020-03-18 07:52:25 +0000 | [diff] [blame] | 7374 | ArgumentCaptor<RouteInfoParcel> captor = ArgumentCaptor.forClass(RouteInfoParcel.class); |
| 7375 | verify(mMockNetd, times(routes.length)).networkRemoveRouteParcel(eq(netId), |
| 7376 | captor.capture()); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 7377 | for (int i = 0; i < routes.length; i++) { |
Lorenzo Colitti | d86407b | 2020-03-18 07:52:25 +0000 | [diff] [blame] | 7378 | assertRouteInfoParcelMatches(routes[i], captor.getAllValues().get(i)); |
Automerger Merge Worker | 7d66c26 | 2020-03-04 04:53:17 +0000 | [diff] [blame] | 7379 | } |
| 7380 | } |
| 7381 | |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 7382 | @Test |
| 7383 | public void testRegisterUnregisterConnectivityDiagnosticsCallback() throws Exception { |
| 7384 | final NetworkRequest wifiRequest = |
| 7385 | new NetworkRequest.Builder().addTransportType(TRANSPORT_WIFI).build(); |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 7386 | when(mConnectivityDiagnosticsCallback.asBinder()).thenReturn(mIBinder); |
| 7387 | |
| 7388 | mService.registerConnectivityDiagnosticsCallback( |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7389 | mConnectivityDiagnosticsCallback, wifiRequest, mContext.getPackageName()); |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 7390 | |
Cody Kesting | e330fcd | 2020-01-15 16:31:08 -0800 | [diff] [blame] | 7391 | // Block until all other events are done processing. |
| 7392 | HandlerUtilsKt.waitForIdle(mCsHandlerThread, TIMEOUT_MS); |
| 7393 | |
| 7394 | verify(mIBinder).linkToDeath(any(ConnectivityDiagnosticsCallbackInfo.class), anyInt()); |
| 7395 | verify(mConnectivityDiagnosticsCallback).asBinder(); |
Cody Kesting | 4600fa5 | 2020-03-05 10:46:02 -0800 | [diff] [blame] | 7396 | assertTrue(mService.mConnectivityDiagnosticsCallbacks.containsKey(mIBinder)); |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 7397 | |
| 7398 | mService.unregisterConnectivityDiagnosticsCallback(mConnectivityDiagnosticsCallback); |
| 7399 | verify(mIBinder, timeout(TIMEOUT_MS)) |
| 7400 | .unlinkToDeath(any(ConnectivityDiagnosticsCallbackInfo.class), anyInt()); |
Cody Kesting | 4600fa5 | 2020-03-05 10:46:02 -0800 | [diff] [blame] | 7401 | assertFalse(mService.mConnectivityDiagnosticsCallbacks.containsKey(mIBinder)); |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 7402 | verify(mConnectivityDiagnosticsCallback, atLeastOnce()).asBinder(); |
| 7403 | } |
| 7404 | |
| 7405 | @Test |
| 7406 | public void testRegisterDuplicateConnectivityDiagnosticsCallback() throws Exception { |
| 7407 | final NetworkRequest wifiRequest = |
| 7408 | new NetworkRequest.Builder().addTransportType(TRANSPORT_WIFI).build(); |
| 7409 | when(mConnectivityDiagnosticsCallback.asBinder()).thenReturn(mIBinder); |
| 7410 | |
| 7411 | mService.registerConnectivityDiagnosticsCallback( |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7412 | mConnectivityDiagnosticsCallback, wifiRequest, mContext.getPackageName()); |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 7413 | |
Cody Kesting | e330fcd | 2020-01-15 16:31:08 -0800 | [diff] [blame] | 7414 | // Block until all other events are done processing. |
| 7415 | HandlerUtilsKt.waitForIdle(mCsHandlerThread, TIMEOUT_MS); |
| 7416 | |
| 7417 | verify(mIBinder).linkToDeath(any(ConnectivityDiagnosticsCallbackInfo.class), anyInt()); |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 7418 | verify(mConnectivityDiagnosticsCallback).asBinder(); |
Cody Kesting | 4600fa5 | 2020-03-05 10:46:02 -0800 | [diff] [blame] | 7419 | assertTrue(mService.mConnectivityDiagnosticsCallbacks.containsKey(mIBinder)); |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 7420 | |
| 7421 | // Register the same callback again |
| 7422 | mService.registerConnectivityDiagnosticsCallback( |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7423 | mConnectivityDiagnosticsCallback, wifiRequest, mContext.getPackageName()); |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 7424 | |
| 7425 | // Block until all other events are done processing. |
| 7426 | HandlerUtilsKt.waitForIdle(mCsHandlerThread, TIMEOUT_MS); |
| 7427 | |
Cody Kesting | 4600fa5 | 2020-03-05 10:46:02 -0800 | [diff] [blame] | 7428 | assertTrue(mService.mConnectivityDiagnosticsCallbacks.containsKey(mIBinder)); |
Cody Kesting | 63e4e00 | 2019-12-18 10:57:50 -0800 | [diff] [blame] | 7429 | } |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7430 | |
| 7431 | @Test |
| 7432 | public void testCheckConnectivityDiagnosticsPermissionsNetworkStack() throws Exception { |
| 7433 | final NetworkAgentInfo naiWithoutUid = |
| 7434 | new NetworkAgentInfo( |
Automerger Merge Worker | 3d40f578 | 2020-03-08 06:07:47 +0000 | [diff] [blame] | 7435 | null, null, null, null, null, new NetworkCapabilities(), 0, |
Cody Kesting | 0d8d6ac | 2020-05-12 18:47:10 +0000 | [diff] [blame] | 7436 | mServiceContext, null, null, mService, null, null, null, 0, INVALID_UID); |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7437 | |
| 7438 | mServiceContext.setPermission( |
| 7439 | android.Manifest.permission.NETWORK_STACK, PERMISSION_GRANTED); |
| 7440 | assertTrue( |
| 7441 | "NetworkStack permission not applied", |
| 7442 | mService.checkConnectivityDiagnosticsPermissions( |
| 7443 | Process.myPid(), Process.myUid(), naiWithoutUid, |
| 7444 | mContext.getOpPackageName())); |
| 7445 | } |
| 7446 | |
| 7447 | @Test |
Automerger Merge Worker | a5333b9 | 2020-03-16 15:48:50 +0000 | [diff] [blame] | 7448 | public void testCheckConnectivityDiagnosticsPermissionsWrongUidPackageName() throws Exception { |
| 7449 | final NetworkAgentInfo naiWithoutUid = |
| 7450 | new NetworkAgentInfo( |
| 7451 | null, null, null, null, null, new NetworkCapabilities(), 0, |
Cody Kesting | 0d8d6ac | 2020-05-12 18:47:10 +0000 | [diff] [blame] | 7452 | mServiceContext, null, null, mService, null, null, null, 0, INVALID_UID); |
Automerger Merge Worker | a5333b9 | 2020-03-16 15:48:50 +0000 | [diff] [blame] | 7453 | |
| 7454 | mServiceContext.setPermission(android.Manifest.permission.NETWORK_STACK, PERMISSION_DENIED); |
| 7455 | |
Automerger Merge Worker | 69fad4c | 2020-03-16 20:37:44 +0000 | [diff] [blame] | 7456 | assertFalse( |
| 7457 | "Mismatched uid/package name should not pass the location permission check", |
| 7458 | mService.checkConnectivityDiagnosticsPermissions( |
| 7459 | Process.myPid() + 1, Process.myUid() + 1, naiWithoutUid, |
| 7460 | mContext.getOpPackageName())); |
Automerger Merge Worker | a5333b9 | 2020-03-16 15:48:50 +0000 | [diff] [blame] | 7461 | } |
| 7462 | |
| 7463 | @Test |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7464 | public void testCheckConnectivityDiagnosticsPermissionsNoLocationPermission() throws Exception { |
| 7465 | final NetworkAgentInfo naiWithoutUid = |
| 7466 | new NetworkAgentInfo( |
Automerger Merge Worker | 3d40f578 | 2020-03-08 06:07:47 +0000 | [diff] [blame] | 7467 | null, null, null, null, null, new NetworkCapabilities(), 0, |
Cody Kesting | 0d8d6ac | 2020-05-12 18:47:10 +0000 | [diff] [blame] | 7468 | mServiceContext, null, null, mService, null, null, null, 0, INVALID_UID); |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7469 | |
| 7470 | mServiceContext.setPermission(android.Manifest.permission.NETWORK_STACK, PERMISSION_DENIED); |
| 7471 | |
| 7472 | assertFalse( |
| 7473 | "ACCESS_FINE_LOCATION permission necessary for Connectivity Diagnostics", |
| 7474 | mService.checkConnectivityDiagnosticsPermissions( |
| 7475 | Process.myPid(), Process.myUid(), naiWithoutUid, |
| 7476 | mContext.getOpPackageName())); |
| 7477 | } |
| 7478 | |
| 7479 | @Test |
| 7480 | public void testCheckConnectivityDiagnosticsPermissionsActiveVpn() throws Exception { |
Cody Kesting | 3096b66 | 2020-03-18 21:11:29 +0000 | [diff] [blame] | 7481 | final Network network = new Network(NET_ID); |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7482 | final NetworkAgentInfo naiWithoutUid = |
| 7483 | new NetworkAgentInfo( |
Cody Kesting | 3096b66 | 2020-03-18 21:11:29 +0000 | [diff] [blame] | 7484 | null, null, network, null, null, new NetworkCapabilities(), 0, |
Cody Kesting | 0d8d6ac | 2020-05-12 18:47:10 +0000 | [diff] [blame] | 7485 | mServiceContext, null, null, mService, null, null, null, 0, INVALID_UID); |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7486 | |
| 7487 | setupLocationPermissions(Build.VERSION_CODES.Q, true, AppOpsManager.OPSTR_FINE_LOCATION, |
| 7488 | Manifest.permission.ACCESS_FINE_LOCATION); |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7489 | |
| 7490 | // setUp() calls mockVpn() which adds a VPN with the Test Runner's uid. Configure it to be |
| 7491 | // active |
| 7492 | final VpnInfo info = new VpnInfo(); |
| 7493 | info.ownerUid = Process.myUid(); |
Lorenzo Colitti | a2e6363 | 2020-11-16 16:05:44 +0900 | [diff] [blame] | 7494 | info.vpnIface = VPN_IFNAME; |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7495 | mMockVpn.setVpnInfo(info); |
Lorenzo Colitti | a2e6363 | 2020-11-16 16:05:44 +0900 | [diff] [blame] | 7496 | |
Lorenzo Colitti | abb9e37 | 2020-11-18 22:50:57 +0900 | [diff] [blame] | 7497 | mMockVpn.establishForMyUid(); |
| 7498 | waitForIdle(); |
| 7499 | |
| 7500 | mServiceContext.setPermission(android.Manifest.permission.NETWORK_STACK, PERMISSION_DENIED); |
| 7501 | |
Lorenzo Colitti | a2e6363 | 2020-11-16 16:05:44 +0900 | [diff] [blame] | 7502 | |
| 7503 | assertTrue(mService.setUnderlyingNetworksForVpn(new Network[] {network})); |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7504 | assertTrue( |
| 7505 | "Active VPN permission not applied", |
| 7506 | mService.checkConnectivityDiagnosticsPermissions( |
| 7507 | Process.myPid(), Process.myUid(), naiWithoutUid, |
| 7508 | mContext.getOpPackageName())); |
Cody Kesting | 3096b66 | 2020-03-18 21:11:29 +0000 | [diff] [blame] | 7509 | |
Lorenzo Colitti | a2e6363 | 2020-11-16 16:05:44 +0900 | [diff] [blame] | 7510 | assertTrue(mService.setUnderlyingNetworksForVpn(null)); |
Cody Kesting | 3096b66 | 2020-03-18 21:11:29 +0000 | [diff] [blame] | 7511 | assertFalse( |
| 7512 | "VPN shouldn't receive callback on non-underlying network", |
| 7513 | mService.checkConnectivityDiagnosticsPermissions( |
| 7514 | Process.myPid(), Process.myUid(), naiWithoutUid, |
| 7515 | mContext.getOpPackageName())); |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7516 | } |
| 7517 | |
| 7518 | @Test |
| 7519 | public void testCheckConnectivityDiagnosticsPermissionsNetworkAdministrator() throws Exception { |
| 7520 | final NetworkCapabilities nc = new NetworkCapabilities(); |
Cody Kesting | f7ac996 | 2020-03-16 18:15:28 -0700 | [diff] [blame] | 7521 | nc.setAdministratorUids(new int[] {Process.myUid()}); |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7522 | final NetworkAgentInfo naiWithUid = |
| 7523 | new NetworkAgentInfo( |
Automerger Merge Worker | 3d40f578 | 2020-03-08 06:07:47 +0000 | [diff] [blame] | 7524 | null, null, null, null, null, nc, 0, mServiceContext, null, null, |
Cody Kesting | 0d8d6ac | 2020-05-12 18:47:10 +0000 | [diff] [blame] | 7525 | mService, null, null, null, 0, INVALID_UID); |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7526 | |
| 7527 | setupLocationPermissions(Build.VERSION_CODES.Q, true, AppOpsManager.OPSTR_FINE_LOCATION, |
| 7528 | Manifest.permission.ACCESS_FINE_LOCATION); |
| 7529 | mServiceContext.setPermission(android.Manifest.permission.NETWORK_STACK, PERMISSION_DENIED); |
| 7530 | |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7531 | assertTrue( |
| 7532 | "NetworkCapabilities administrator uid permission not applied", |
| 7533 | mService.checkConnectivityDiagnosticsPermissions( |
| 7534 | Process.myPid(), Process.myUid(), naiWithUid, mContext.getOpPackageName())); |
| 7535 | } |
| 7536 | |
| 7537 | @Test |
| 7538 | public void testCheckConnectivityDiagnosticsPermissionsFails() throws Exception { |
| 7539 | final NetworkCapabilities nc = new NetworkCapabilities(); |
| 7540 | nc.setOwnerUid(Process.myUid()); |
Cody Kesting | f7ac996 | 2020-03-16 18:15:28 -0700 | [diff] [blame] | 7541 | nc.setAdministratorUids(new int[] {Process.myUid()}); |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7542 | final NetworkAgentInfo naiWithUid = |
| 7543 | new NetworkAgentInfo( |
Automerger Merge Worker | 3d40f578 | 2020-03-08 06:07:47 +0000 | [diff] [blame] | 7544 | null, null, null, null, null, nc, 0, mServiceContext, null, null, |
Cody Kesting | 0d8d6ac | 2020-05-12 18:47:10 +0000 | [diff] [blame] | 7545 | mService, null, null, null, 0, INVALID_UID); |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7546 | |
| 7547 | setupLocationPermissions(Build.VERSION_CODES.Q, true, AppOpsManager.OPSTR_FINE_LOCATION, |
| 7548 | Manifest.permission.ACCESS_FINE_LOCATION); |
| 7549 | mServiceContext.setPermission(android.Manifest.permission.NETWORK_STACK, PERMISSION_DENIED); |
| 7550 | |
| 7551 | // Use wrong pid and uid |
| 7552 | assertFalse( |
| 7553 | "Permissions allowed when they shouldn't be granted", |
| 7554 | mService.checkConnectivityDiagnosticsPermissions( |
| 7555 | Process.myPid() + 1, Process.myUid() + 1, naiWithUid, |
| 7556 | mContext.getOpPackageName())); |
| 7557 | } |
| 7558 | |
Cody Kesting | 560eb26 | 2020-02-12 14:50:58 -0800 | [diff] [blame] | 7559 | @Test |
| 7560 | public void testRegisterConnectivityDiagnosticsCallbackCallsOnConnectivityReport() |
| 7561 | throws Exception { |
| 7562 | // Set up the Network, which leads to a ConnectivityReport being cached for the network. |
| 7563 | final TestNetworkCallback callback = new TestNetworkCallback(); |
| 7564 | mCm.registerDefaultNetworkCallback(callback); |
| 7565 | final LinkProperties linkProperties = new LinkProperties(); |
| 7566 | linkProperties.setInterfaceName(INTERFACE_NAME); |
| 7567 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR, linkProperties); |
| 7568 | mCellNetworkAgent.connect(true); |
| 7569 | callback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
| 7570 | callback.assertNoCallback(); |
| 7571 | |
| 7572 | final NetworkRequest request = new NetworkRequest.Builder().build(); |
| 7573 | when(mConnectivityDiagnosticsCallback.asBinder()).thenReturn(mIBinder); |
| 7574 | |
| 7575 | mServiceContext.setPermission( |
| 7576 | android.Manifest.permission.NETWORK_STACK, PERMISSION_GRANTED); |
| 7577 | |
| 7578 | mService.registerConnectivityDiagnosticsCallback( |
| 7579 | mConnectivityDiagnosticsCallback, request, mContext.getPackageName()); |
| 7580 | |
| 7581 | // Block until all other events are done processing. |
| 7582 | HandlerUtilsKt.waitForIdle(mCsHandlerThread, TIMEOUT_MS); |
| 7583 | |
| 7584 | verify(mConnectivityDiagnosticsCallback) |
| 7585 | .onConnectivityReportAvailable(argThat(report -> { |
| 7586 | return INTERFACE_NAME.equals(report.getLinkProperties().getInterfaceName()) |
| 7587 | && report.getNetworkCapabilities().hasTransport(TRANSPORT_CELLULAR); |
| 7588 | })); |
| 7589 | } |
| 7590 | |
Cody Kesting | 1e5ab9b | 2020-01-07 11:18:54 -0800 | [diff] [blame] | 7591 | private void setUpConnectivityDiagnosticsCallback() throws Exception { |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7592 | final NetworkRequest request = new NetworkRequest.Builder().build(); |
| 7593 | when(mConnectivityDiagnosticsCallback.asBinder()).thenReturn(mIBinder); |
| 7594 | |
| 7595 | mServiceContext.setPermission( |
| 7596 | android.Manifest.permission.NETWORK_STACK, PERMISSION_GRANTED); |
| 7597 | |
| 7598 | mService.registerConnectivityDiagnosticsCallback( |
| 7599 | mConnectivityDiagnosticsCallback, request, mContext.getPackageName()); |
| 7600 | |
| 7601 | // Block until all other events are done processing. |
| 7602 | HandlerUtilsKt.waitForIdle(mCsHandlerThread, TIMEOUT_MS); |
| 7603 | |
| 7604 | // Connect the cell agent verify that it notifies TestNetworkCallback that it is available |
| 7605 | final TestNetworkCallback callback = new TestNetworkCallback(); |
| 7606 | mCm.registerDefaultNetworkCallback(callback); |
| 7607 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
| 7608 | mCellNetworkAgent.connect(true); |
| 7609 | callback.expectAvailableThenValidatedCallbacks(mCellNetworkAgent); |
| 7610 | callback.assertNoCallback(); |
Cody Kesting | 1e5ab9b | 2020-01-07 11:18:54 -0800 | [diff] [blame] | 7611 | } |
| 7612 | |
| 7613 | @Test |
Cody Kesting | 9347e33 | 2020-03-05 15:19:48 -0800 | [diff] [blame] | 7614 | public void testConnectivityDiagnosticsCallbackOnConnectivityReportAvailable() |
| 7615 | throws Exception { |
Cody Kesting | 1e5ab9b | 2020-01-07 11:18:54 -0800 | [diff] [blame] | 7616 | setUpConnectivityDiagnosticsCallback(); |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7617 | |
Cody Kesting | e330fcd | 2020-01-15 16:31:08 -0800 | [diff] [blame] | 7618 | // Block until all other events are done processing. |
| 7619 | HandlerUtilsKt.waitForIdle(mCsHandlerThread, TIMEOUT_MS); |
| 7620 | |
| 7621 | // Verify onConnectivityReport fired |
Cody Kesting | 9347e33 | 2020-03-05 15:19:48 -0800 | [diff] [blame] | 7622 | verify(mConnectivityDiagnosticsCallback).onConnectivityReportAvailable( |
Cody Kesting | a3b71c4 | 2020-02-11 10:03:26 -0800 | [diff] [blame] | 7623 | argThat(report -> { |
| 7624 | final NetworkCapabilities nc = report.getNetworkCapabilities(); |
| 7625 | return nc.getUids() == null |
Cody Kesting | f7ac996 | 2020-03-16 18:15:28 -0700 | [diff] [blame] | 7626 | && nc.getAdministratorUids().length == 0 |
Cody Kesting | a3b71c4 | 2020-02-11 10:03:26 -0800 | [diff] [blame] | 7627 | && nc.getOwnerUid() == Process.INVALID_UID; |
| 7628 | })); |
Cody Kesting | a75e26b | 2020-01-05 14:06:39 -0800 | [diff] [blame] | 7629 | } |
Cody Kesting | 4f49f14 | 2020-01-06 16:55:35 -0800 | [diff] [blame] | 7630 | |
| 7631 | @Test |
| 7632 | public void testConnectivityDiagnosticsCallbackOnDataStallSuspected() throws Exception { |
Cody Kesting | 1e5ab9b | 2020-01-07 11:18:54 -0800 | [diff] [blame] | 7633 | setUpConnectivityDiagnosticsCallback(); |
Cody Kesting | 4f49f14 | 2020-01-06 16:55:35 -0800 | [diff] [blame] | 7634 | |
| 7635 | // Trigger notifyDataStallSuspected() on the INetworkMonitorCallbacks instance in the |
| 7636 | // cellular network agent |
| 7637 | mCellNetworkAgent.notifyDataStallSuspected(); |
| 7638 | |
Cody Kesting | e330fcd | 2020-01-15 16:31:08 -0800 | [diff] [blame] | 7639 | // Block until all other events are done processing. |
| 7640 | HandlerUtilsKt.waitForIdle(mCsHandlerThread, TIMEOUT_MS); |
| 7641 | |
| 7642 | // Verify onDataStallSuspected fired |
Cody Kesting | a3b71c4 | 2020-02-11 10:03:26 -0800 | [diff] [blame] | 7643 | verify(mConnectivityDiagnosticsCallback).onDataStallSuspected( |
| 7644 | argThat(report -> { |
| 7645 | final NetworkCapabilities nc = report.getNetworkCapabilities(); |
| 7646 | return nc.getUids() == null |
Cody Kesting | f7ac996 | 2020-03-16 18:15:28 -0700 | [diff] [blame] | 7647 | && nc.getAdministratorUids().length == 0 |
Cody Kesting | a3b71c4 | 2020-02-11 10:03:26 -0800 | [diff] [blame] | 7648 | && nc.getOwnerUid() == Process.INVALID_UID; |
| 7649 | })); |
Cody Kesting | 4f49f14 | 2020-01-06 16:55:35 -0800 | [diff] [blame] | 7650 | } |
Cody Kesting | 1e5ab9b | 2020-01-07 11:18:54 -0800 | [diff] [blame] | 7651 | |
| 7652 | @Test |
| 7653 | public void testConnectivityDiagnosticsCallbackOnConnectivityReported() throws Exception { |
| 7654 | setUpConnectivityDiagnosticsCallback(); |
| 7655 | |
| 7656 | final Network n = mCellNetworkAgent.getNetwork(); |
| 7657 | final boolean hasConnectivity = true; |
| 7658 | mService.reportNetworkConnectivity(n, hasConnectivity); |
| 7659 | |
Cody Kesting | e330fcd | 2020-01-15 16:31:08 -0800 | [diff] [blame] | 7660 | // Block until all other events are done processing. |
| 7661 | HandlerUtilsKt.waitForIdle(mCsHandlerThread, TIMEOUT_MS); |
| 7662 | |
| 7663 | // Verify onNetworkConnectivityReported fired |
| 7664 | verify(mConnectivityDiagnosticsCallback) |
Cody Kesting | 1e5ab9b | 2020-01-07 11:18:54 -0800 | [diff] [blame] | 7665 | .onNetworkConnectivityReported(eq(n), eq(hasConnectivity)); |
| 7666 | |
| 7667 | final boolean noConnectivity = false; |
| 7668 | mService.reportNetworkConnectivity(n, noConnectivity); |
| 7669 | |
Cody Kesting | e330fcd | 2020-01-15 16:31:08 -0800 | [diff] [blame] | 7670 | // Block until all other events are done processing. |
| 7671 | HandlerUtilsKt.waitForIdle(mCsHandlerThread, TIMEOUT_MS); |
| 7672 | |
Cody Kesting | 1e5ab9b | 2020-01-07 11:18:54 -0800 | [diff] [blame] | 7673 | // Wait for onNetworkConnectivityReported to fire |
Cody Kesting | e330fcd | 2020-01-15 16:31:08 -0800 | [diff] [blame] | 7674 | verify(mConnectivityDiagnosticsCallback) |
Cody Kesting | 1e5ab9b | 2020-01-07 11:18:54 -0800 | [diff] [blame] | 7675 | .onNetworkConnectivityReported(eq(n), eq(noConnectivity)); |
| 7676 | } |
Lorenzo Colitti | d86407b | 2020-03-18 07:52:25 +0000 | [diff] [blame] | 7677 | |
| 7678 | @Test |
| 7679 | public void testRouteAddDeleteUpdate() throws Exception { |
| 7680 | final NetworkRequest request = new NetworkRequest.Builder().build(); |
| 7681 | final TestNetworkCallback networkCallback = new TestNetworkCallback(); |
| 7682 | mCm.registerNetworkCallback(request, networkCallback); |
| 7683 | mCellNetworkAgent = new TestNetworkAgentWrapper(TRANSPORT_CELLULAR); |
| 7684 | reset(mMockNetd); |
| 7685 | mCellNetworkAgent.connect(false); |
| 7686 | networkCallback.expectAvailableCallbacksUnvalidated(mCellNetworkAgent); |
| 7687 | final int netId = mCellNetworkAgent.getNetwork().netId; |
| 7688 | |
| 7689 | final String iface = "rmnet_data0"; |
| 7690 | final InetAddress gateway = InetAddress.getByName("fe80::5678"); |
| 7691 | RouteInfo direct = RouteInfo.makeHostRoute(gateway, iface); |
| 7692 | RouteInfo rio1 = new RouteInfo(new IpPrefix("2001:db8:1::/48"), gateway, iface); |
| 7693 | RouteInfo rio2 = new RouteInfo(new IpPrefix("2001:db8:2::/48"), gateway, iface); |
| 7694 | RouteInfo defaultRoute = new RouteInfo((IpPrefix) null, gateway, iface); |
| 7695 | RouteInfo defaultWithMtu = new RouteInfo(null, gateway, iface, RouteInfo.RTN_UNICAST, |
| 7696 | 1280 /* mtu */); |
| 7697 | |
| 7698 | // Send LinkProperties and check that we ask netd to add routes. |
| 7699 | LinkProperties lp = new LinkProperties(); |
| 7700 | lp.setInterfaceName(iface); |
| 7701 | lp.addRoute(direct); |
| 7702 | lp.addRoute(rio1); |
| 7703 | lp.addRoute(defaultRoute); |
| 7704 | mCellNetworkAgent.sendLinkProperties(lp); |
| 7705 | networkCallback.expectLinkPropertiesThat(mCellNetworkAgent, x -> x.getRoutes().size() == 3); |
| 7706 | |
| 7707 | assertRoutesAdded(netId, direct, rio1, defaultRoute); |
| 7708 | reset(mMockNetd); |
| 7709 | |
| 7710 | // Send updated LinkProperties and check that we ask netd to add, remove, update routes. |
| 7711 | assertTrue(lp.getRoutes().contains(defaultRoute)); |
| 7712 | lp.removeRoute(rio1); |
| 7713 | lp.addRoute(rio2); |
| 7714 | lp.addRoute(defaultWithMtu); |
| 7715 | // Ensure adding the same route with a different MTU replaces the previous route. |
| 7716 | assertFalse(lp.getRoutes().contains(defaultRoute)); |
| 7717 | assertTrue(lp.getRoutes().contains(defaultWithMtu)); |
| 7718 | |
| 7719 | mCellNetworkAgent.sendLinkProperties(lp); |
| 7720 | networkCallback.expectLinkPropertiesThat(mCellNetworkAgent, |
| 7721 | x -> x.getRoutes().contains(rio2)); |
| 7722 | |
| 7723 | assertRoutesRemoved(netId, rio1); |
| 7724 | assertRoutesAdded(netId, rio2); |
| 7725 | |
| 7726 | ArgumentCaptor<RouteInfoParcel> captor = ArgumentCaptor.forClass(RouteInfoParcel.class); |
| 7727 | verify(mMockNetd).networkUpdateRouteParcel(eq(netId), captor.capture()); |
| 7728 | assertRouteInfoParcelMatches(defaultWithMtu, captor.getValue()); |
| 7729 | |
| 7730 | |
| 7731 | mCm.unregisterNetworkCallback(networkCallback); |
| 7732 | } |
Jeff Sharkey | fb878b6 | 2012-07-26 18:32:30 -0700 | [diff] [blame] | 7733 | } |