Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2016 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 17 | package android.net.ip; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 18 | |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 19 | import static android.net.INetd.IF_STATE_UP; |
markchien | 9e44cde | 2019-12-25 19:40:32 +0800 | [diff] [blame] | 20 | import static android.net.TetheringManager.TETHERING_BLUETOOTH; |
| 21 | import static android.net.TetheringManager.TETHERING_USB; |
| 22 | import static android.net.TetheringManager.TETHERING_WIFI; |
| 23 | import static android.net.TetheringManager.TETHERING_WIFI_P2P; |
| 24 | import static android.net.TetheringManager.TETHER_ERROR_ENABLE_NAT_ERROR; |
| 25 | import static android.net.TetheringManager.TETHER_ERROR_NO_ERROR; |
| 26 | import static android.net.TetheringManager.TETHER_ERROR_TETHER_IFACE_ERROR; |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 27 | import static android.net.dhcp.IDhcpServer.STATUS_SUCCESS; |
Remi NGUYEN VAN | 73105e11 | 2018-12-21 16:17:09 +0900 | [diff] [blame] | 28 | import static android.net.ip.IpServer.STATE_AVAILABLE; |
Jimmy Chen | bcd86d0 | 2019-07-15 18:03:23 +0800 | [diff] [blame] | 29 | import static android.net.ip.IpServer.STATE_LOCAL_ONLY; |
Remi NGUYEN VAN | 73105e11 | 2018-12-21 16:17:09 +0900 | [diff] [blame] | 30 | import static android.net.ip.IpServer.STATE_TETHERED; |
| 31 | import static android.net.ip.IpServer.STATE_UNAVAILABLE; |
Remi NGUYEN VAN | e88516f | 2019-01-20 09:35:10 +0900 | [diff] [blame] | 32 | import static android.net.shared.Inet4AddressUtils.intToInet4AddressHTH; |
Remi NGUYEN VAN | 73105e11 | 2018-12-21 16:17:09 +0900 | [diff] [blame] | 33 | |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 34 | import static org.junit.Assert.assertEquals; |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 35 | import static org.junit.Assert.assertFalse; |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 36 | import static org.junit.Assert.assertNotNull; |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 37 | import static org.junit.Assert.assertTrue; |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 38 | import static org.junit.Assert.fail; |
Remi NGUYEN VAN | d1b51a3 | 2019-01-22 16:13:57 +0900 | [diff] [blame] | 39 | import static org.mockito.ArgumentMatchers.argThat; |
Erik Kline | ab6439b | 2017-06-06 19:24:21 +0900 | [diff] [blame] | 40 | import static org.mockito.Matchers.any; |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 41 | import static org.mockito.Matchers.anyString; |
Erik Kline | ab6439b | 2017-06-06 19:24:21 +0900 | [diff] [blame] | 42 | import static org.mockito.Matchers.eq; |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 43 | import static org.mockito.Mockito.doAnswer; |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 44 | import static org.mockito.Mockito.doThrow; |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 45 | import static org.mockito.Mockito.inOrder; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 46 | import static org.mockito.Mockito.never; |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 47 | import static org.mockito.Mockito.reset; |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 48 | import static org.mockito.Mockito.timeout; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 49 | import static org.mockito.Mockito.times; |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 50 | import static org.mockito.Mockito.verify; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 51 | import static org.mockito.Mockito.verifyNoMoreInteractions; |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 52 | import static org.mockito.Mockito.when; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 53 | |
Remi NGUYEN VAN | d1b51a3 | 2019-01-22 16:13:57 +0900 | [diff] [blame] | 54 | import android.net.INetd; |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 55 | import android.net.InterfaceConfigurationParcel; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 56 | import android.net.IpPrefix; |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 57 | import android.net.LinkAddress; |
Erik Kline | ab6439b | 2017-06-06 19:24:21 +0900 | [diff] [blame] | 58 | import android.net.LinkProperties; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 59 | import android.net.MacAddress; |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 60 | import android.net.RouteInfo; |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 61 | import android.net.dhcp.DhcpServingParamsParcel; |
| 62 | import android.net.dhcp.IDhcpServer; |
| 63 | import android.net.dhcp.IDhcpServerCallbacks; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 64 | import android.net.util.InterfaceParams; |
Remi NGUYEN VAN | 25a7e4f | 2018-03-09 14:07:18 +0900 | [diff] [blame] | 65 | import android.net.util.InterfaceSet; |
Erik Kline | 7747fd4 | 2017-05-12 16:52:48 +0900 | [diff] [blame] | 66 | import android.net.util.SharedLog; |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 67 | import android.os.RemoteException; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 68 | import android.os.test.TestLooper; |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 69 | import android.text.TextUtils; |
| 70 | |
Brett Chabot | 1ae2aa6 | 2019-03-04 14:14:56 -0800 | [diff] [blame] | 71 | import androidx.test.filters.SmallTest; |
| 72 | import androidx.test.runner.AndroidJUnit4; |
| 73 | |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 74 | import org.junit.Before; |
| 75 | import org.junit.Test; |
Christopher Wiley | 9bc0df2 | 2016-05-25 13:57:27 -0700 | [diff] [blame] | 76 | import org.junit.runner.RunWith; |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 77 | import org.mockito.ArgumentCaptor; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 78 | import org.mockito.Captor; |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 79 | import org.mockito.InOrder; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 80 | import org.mockito.Mock; |
| 81 | import org.mockito.MockitoAnnotations; |
| 82 | |
Remi NGUYEN VAN | 73105e11 | 2018-12-21 16:17:09 +0900 | [diff] [blame] | 83 | import java.net.Inet4Address; |
| 84 | |
Christopher Wiley | 9bc0df2 | 2016-05-25 13:57:27 -0700 | [diff] [blame] | 85 | @RunWith(AndroidJUnit4.class) |
| 86 | @SmallTest |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 87 | public class IpServerTest { |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 88 | private static final String IFACE_NAME = "testnet1"; |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 89 | private static final String UPSTREAM_IFACE = "upstream0"; |
| 90 | private static final String UPSTREAM_IFACE2 = "upstream1"; |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 91 | private static final String BLUETOOTH_IFACE_ADDR = "192.168.42.1"; |
| 92 | private static final int BLUETOOTH_DHCP_PREFIX_LENGTH = 24; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 93 | private static final int DHCP_LEASE_TIME_SECS = 3600; |
| 94 | |
| 95 | private static final InterfaceParams TEST_IFACE_PARAMS = new InterfaceParams( |
| 96 | IFACE_NAME, 42 /* index */, MacAddress.ALL_ZEROS_ADDRESS, 1500 /* defaultMtu */); |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 97 | |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 98 | private static final int MAKE_DHCPSERVER_TIMEOUT_MS = 1000; |
| 99 | |
Remi NGUYEN VAN | d1b51a3 | 2019-01-22 16:13:57 +0900 | [diff] [blame] | 100 | @Mock private INetd mNetd; |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 101 | @Mock private IpServer.Callback mCallback; |
Erik Kline | 7747fd4 | 2017-05-12 16:52:48 +0900 | [diff] [blame] | 102 | @Mock private SharedLog mSharedLog; |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 103 | @Mock private IDhcpServer mDhcpServer; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 104 | @Mock private RouterAdvertisementDaemon mRaDaemon; |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 105 | @Mock private IpServer.Dependencies mDependencies; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 106 | |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 107 | @Captor private ArgumentCaptor<DhcpServingParamsParcel> mDhcpParamsCaptor; |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 108 | |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 109 | private final TestLooper mLooper = new TestLooper(); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 110 | private final ArgumentCaptor<LinkProperties> mLinkPropertiesCaptor = |
| 111 | ArgumentCaptor.forClass(LinkProperties.class); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 112 | private IpServer mIpServer; |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 113 | private InterfaceConfigurationParcel mInterfaceConfiguration; |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 114 | |
Christopher Wiley | cd0cfbb | 2016-05-31 14:43:08 -0700 | [diff] [blame] | 115 | private void initStateMachine(int interfaceType) throws Exception { |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 116 | initStateMachine(interfaceType, false /* usingLegacyDhcp */); |
| 117 | } |
| 118 | |
| 119 | private void initStateMachine(int interfaceType, boolean usingLegacyDhcp) throws Exception { |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 120 | doAnswer(inv -> { |
| 121 | final IDhcpServerCallbacks cb = inv.getArgument(2); |
| 122 | new Thread(() -> { |
| 123 | try { |
| 124 | cb.onDhcpServerCreated(STATUS_SUCCESS, mDhcpServer); |
| 125 | } catch (RemoteException e) { |
| 126 | fail(e.getMessage()); |
| 127 | } |
| 128 | }).run(); |
| 129 | return null; |
| 130 | }).when(mDependencies).makeDhcpServer(any(), mDhcpParamsCaptor.capture(), any()); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 131 | when(mDependencies.getRouterAdvertisementDaemon(any())).thenReturn(mRaDaemon); |
| 132 | when(mDependencies.getInterfaceParams(IFACE_NAME)).thenReturn(TEST_IFACE_PARAMS); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 133 | mInterfaceConfiguration = new InterfaceConfigurationParcel(); |
| 134 | mInterfaceConfiguration.flags = new String[0]; |
| 135 | if (interfaceType == TETHERING_BLUETOOTH) { |
| 136 | mInterfaceConfiguration.ipv4Addr = BLUETOOTH_IFACE_ADDR; |
| 137 | mInterfaceConfiguration.prefixLength = BLUETOOTH_DHCP_PREFIX_LENGTH; |
| 138 | } |
Remi NGUYEN VAN | d1b51a3 | 2019-01-22 16:13:57 +0900 | [diff] [blame] | 139 | mIpServer = new IpServer( |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 140 | IFACE_NAME, mLooper.getLooper(), interfaceType, mSharedLog, mNetd, |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 141 | mCallback, usingLegacyDhcp, mDependencies); |
Remi NGUYEN VAN | d1b51a3 | 2019-01-22 16:13:57 +0900 | [diff] [blame] | 142 | mIpServer.start(); |
| 143 | // Starting the state machine always puts us in a consistent state and notifies |
| 144 | // the rest of the world that we've changed from an unknown to available state. |
| 145 | mLooper.dispatchAll(); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 146 | reset(mNetd, mCallback); |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 147 | |
| 148 | when(mRaDaemon.start()).thenReturn(true); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 149 | } |
| 150 | |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 151 | private void initTetheredStateMachine(int interfaceType, String upstreamIface) |
| 152 | throws Exception { |
| 153 | initTetheredStateMachine(interfaceType, upstreamIface, false); |
| 154 | } |
| 155 | |
| 156 | private void initTetheredStateMachine(int interfaceType, String upstreamIface, |
| 157 | boolean usingLegacyDhcp) throws Exception { |
| 158 | initStateMachine(interfaceType, usingLegacyDhcp); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 159 | dispatchCommand(IpServer.CMD_TETHER_REQUESTED, STATE_TETHERED); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 160 | if (upstreamIface != null) { |
| 161 | dispatchTetherConnectionChanged(upstreamIface); |
| 162 | } |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 163 | reset(mNetd, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 164 | } |
| 165 | |
Christopher Wiley | e90e0a7 | 2016-05-31 10:44:35 -0700 | [diff] [blame] | 166 | @Before public void setUp() throws Exception { |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 167 | MockitoAnnotations.initMocks(this); |
Erik Kline | 7747fd4 | 2017-05-12 16:52:48 +0900 | [diff] [blame] | 168 | when(mSharedLog.forSubComponent(anyString())).thenReturn(mSharedLog); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 169 | } |
| 170 | |
| 171 | @Test |
| 172 | public void startsOutAvailable() { |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 173 | mIpServer = new IpServer(IFACE_NAME, mLooper.getLooper(), TETHERING_BLUETOOTH, mSharedLog, |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 174 | mNetd, mCallback, false /* usingLegacyDhcp */, mDependencies); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 175 | mIpServer.start(); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 176 | mLooper.dispatchAll(); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 177 | verify(mCallback).updateInterfaceState( |
| 178 | mIpServer, STATE_AVAILABLE, TETHER_ERROR_NO_ERROR); |
| 179 | verify(mCallback).updateLinkProperties(eq(mIpServer), any(LinkProperties.class)); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 180 | verifyNoMoreInteractions(mCallback, mNetd); |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 181 | } |
| 182 | |
| 183 | @Test |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 184 | public void shouldDoNothingUntilRequested() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 185 | initStateMachine(TETHERING_BLUETOOTH); |
markchien | 08cc030 | 2019-09-09 20:50:49 +0800 | [diff] [blame] | 186 | final int [] noOp_commands = { |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 187 | IpServer.CMD_TETHER_UNREQUESTED, |
| 188 | IpServer.CMD_IP_FORWARDING_ENABLE_ERROR, |
| 189 | IpServer.CMD_IP_FORWARDING_DISABLE_ERROR, |
| 190 | IpServer.CMD_START_TETHERING_ERROR, |
| 191 | IpServer.CMD_STOP_TETHERING_ERROR, |
| 192 | IpServer.CMD_SET_DNS_FORWARDERS_ERROR, |
| 193 | IpServer.CMD_TETHER_CONNECTION_CHANGED |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 194 | }; |
markchien | 08cc030 | 2019-09-09 20:50:49 +0800 | [diff] [blame] | 195 | for (int command : noOp_commands) { |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 196 | // None of these commands should trigger us to request action from |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 197 | // the rest of the system. |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 198 | dispatchCommand(command); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 199 | verifyNoMoreInteractions(mNetd, mCallback); |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 200 | } |
| 201 | } |
| 202 | |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 203 | @Test |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 204 | public void handlesImmediateInterfaceDown() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 205 | initStateMachine(TETHERING_BLUETOOTH); |
Christopher Wiley | e90e0a7 | 2016-05-31 10:44:35 -0700 | [diff] [blame] | 206 | |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 207 | dispatchCommand(IpServer.CMD_INTERFACE_DOWN); |
| 208 | verify(mCallback).updateInterfaceState( |
| 209 | mIpServer, STATE_UNAVAILABLE, TETHER_ERROR_NO_ERROR); |
| 210 | verify(mCallback).updateLinkProperties(eq(mIpServer), any(LinkProperties.class)); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 211 | verifyNoMoreInteractions(mNetd, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 212 | } |
| 213 | |
| 214 | @Test |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 215 | public void canBeTethered() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 216 | initStateMachine(TETHERING_BLUETOOTH); |
Christopher Wiley | e90e0a7 | 2016-05-31 10:44:35 -0700 | [diff] [blame] | 217 | |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 218 | dispatchCommand(IpServer.CMD_TETHER_REQUESTED, STATE_TETHERED); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 219 | InOrder inOrder = inOrder(mCallback, mNetd); |
| 220 | inOrder.verify(mNetd).tetherInterfaceAdd(IFACE_NAME); |
| 221 | inOrder.verify(mNetd).networkAddInterface(INetd.LOCAL_NET_ID, IFACE_NAME); |
| 222 | // One for ipv4 route, one for ipv6 link local route. |
| 223 | inOrder.verify(mNetd, times(2)).networkAddRoute(eq(INetd.LOCAL_NET_ID), eq(IFACE_NAME), |
| 224 | any(), any()); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 225 | inOrder.verify(mCallback).updateInterfaceState( |
| 226 | mIpServer, STATE_TETHERED, TETHER_ERROR_NO_ERROR); |
| 227 | inOrder.verify(mCallback).updateLinkProperties( |
| 228 | eq(mIpServer), any(LinkProperties.class)); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 229 | verifyNoMoreInteractions(mNetd, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 230 | } |
| 231 | |
| 232 | @Test |
| 233 | public void canUnrequestTethering() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 234 | initTetheredStateMachine(TETHERING_BLUETOOTH, null); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 235 | |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 236 | dispatchCommand(IpServer.CMD_TETHER_UNREQUESTED); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 237 | InOrder inOrder = inOrder(mNetd, mCallback); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 238 | inOrder.verify(mNetd).tetherApplyDnsInterfaces(); |
| 239 | inOrder.verify(mNetd).tetherInterfaceRemove(IFACE_NAME); |
| 240 | inOrder.verify(mNetd).networkRemoveInterface(INetd.LOCAL_NET_ID, IFACE_NAME); |
Remi NGUYEN VAN | d1b51a3 | 2019-01-22 16:13:57 +0900 | [diff] [blame] | 241 | inOrder.verify(mNetd).interfaceSetCfg(argThat(cfg -> IFACE_NAME.equals(cfg.ifName))); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 242 | inOrder.verify(mCallback).updateInterfaceState( |
| 243 | mIpServer, STATE_AVAILABLE, TETHER_ERROR_NO_ERROR); |
| 244 | inOrder.verify(mCallback).updateLinkProperties( |
| 245 | eq(mIpServer), any(LinkProperties.class)); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 246 | verifyNoMoreInteractions(mNetd, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 247 | } |
| 248 | |
| 249 | @Test |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 250 | public void canBeTetheredAsUsb() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 251 | initStateMachine(TETHERING_USB); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 252 | |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 253 | dispatchCommand(IpServer.CMD_TETHER_REQUESTED, STATE_TETHERED); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 254 | InOrder inOrder = inOrder(mCallback, mNetd); |
| 255 | inOrder.verify(mNetd).interfaceSetCfg(argThat(cfg -> |
| 256 | IFACE_NAME.equals(cfg.ifName) && assertContainsFlag(cfg.flags, IF_STATE_UP))); |
| 257 | inOrder.verify(mNetd).tetherInterfaceAdd(IFACE_NAME); |
| 258 | inOrder.verify(mNetd).networkAddInterface(INetd.LOCAL_NET_ID, IFACE_NAME); |
| 259 | inOrder.verify(mNetd, times(2)).networkAddRoute(eq(INetd.LOCAL_NET_ID), eq(IFACE_NAME), |
| 260 | any(), any()); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 261 | inOrder.verify(mCallback).updateInterfaceState( |
| 262 | mIpServer, STATE_TETHERED, TETHER_ERROR_NO_ERROR); |
| 263 | inOrder.verify(mCallback).updateLinkProperties( |
| 264 | eq(mIpServer), mLinkPropertiesCaptor.capture()); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 265 | assertIPv4AddressAndDirectlyConnectedRoute(mLinkPropertiesCaptor.getValue()); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 266 | verifyNoMoreInteractions(mNetd, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 267 | } |
| 268 | |
| 269 | @Test |
Jimmy Chen | bcd86d0 | 2019-07-15 18:03:23 +0800 | [diff] [blame] | 270 | public void canBeTetheredAsWifiP2p() throws Exception { |
| 271 | initStateMachine(TETHERING_WIFI_P2P); |
| 272 | |
| 273 | dispatchCommand(IpServer.CMD_TETHER_REQUESTED, STATE_LOCAL_ONLY); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 274 | InOrder inOrder = inOrder(mCallback, mNetd); |
| 275 | inOrder.verify(mNetd).interfaceSetCfg(argThat(cfg -> |
| 276 | IFACE_NAME.equals(cfg.ifName) && assertContainsFlag(cfg.flags, IF_STATE_UP))); |
| 277 | inOrder.verify(mNetd).tetherInterfaceAdd(IFACE_NAME); |
| 278 | inOrder.verify(mNetd).networkAddInterface(INetd.LOCAL_NET_ID, IFACE_NAME); |
| 279 | inOrder.verify(mNetd, times(2)).networkAddRoute(eq(INetd.LOCAL_NET_ID), eq(IFACE_NAME), |
| 280 | any(), any()); |
Jimmy Chen | bcd86d0 | 2019-07-15 18:03:23 +0800 | [diff] [blame] | 281 | inOrder.verify(mCallback).updateInterfaceState( |
| 282 | mIpServer, STATE_LOCAL_ONLY, TETHER_ERROR_NO_ERROR); |
| 283 | inOrder.verify(mCallback).updateLinkProperties( |
| 284 | eq(mIpServer), mLinkPropertiesCaptor.capture()); |
| 285 | assertIPv4AddressAndDirectlyConnectedRoute(mLinkPropertiesCaptor.getValue()); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 286 | verifyNoMoreInteractions(mNetd, mCallback); |
Jimmy Chen | bcd86d0 | 2019-07-15 18:03:23 +0800 | [diff] [blame] | 287 | } |
| 288 | |
| 289 | @Test |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 290 | public void handlesFirstUpstreamChange() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 291 | initTetheredStateMachine(TETHERING_BLUETOOTH, null); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 292 | |
Erik Kline | ab6439b | 2017-06-06 19:24:21 +0900 | [diff] [blame] | 293 | // Telling the state machine about its upstream interface triggers |
| 294 | // a little more configuration. |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 295 | dispatchTetherConnectionChanged(UPSTREAM_IFACE); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 296 | InOrder inOrder = inOrder(mNetd); |
| 297 | inOrder.verify(mNetd).tetherAddForward(IFACE_NAME, UPSTREAM_IFACE); |
| 298 | inOrder.verify(mNetd).ipfwdAddInterfaceForward(IFACE_NAME, UPSTREAM_IFACE); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 299 | verifyNoMoreInteractions(mNetd, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 300 | } |
| 301 | |
| 302 | @Test |
| 303 | public void handlesChangingUpstream() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 304 | initTetheredStateMachine(TETHERING_BLUETOOTH, UPSTREAM_IFACE); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 305 | |
| 306 | dispatchTetherConnectionChanged(UPSTREAM_IFACE2); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 307 | InOrder inOrder = inOrder(mNetd); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 308 | inOrder.verify(mNetd).ipfwdRemoveInterfaceForward(IFACE_NAME, UPSTREAM_IFACE); |
| 309 | inOrder.verify(mNetd).tetherRemoveForward(IFACE_NAME, UPSTREAM_IFACE); |
| 310 | inOrder.verify(mNetd).tetherAddForward(IFACE_NAME, UPSTREAM_IFACE2); |
| 311 | inOrder.verify(mNetd).ipfwdAddInterfaceForward(IFACE_NAME, UPSTREAM_IFACE2); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 312 | verifyNoMoreInteractions(mNetd, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 313 | } |
| 314 | |
| 315 | @Test |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 316 | public void handlesChangingUpstreamNatFailure() throws Exception { |
| 317 | initTetheredStateMachine(TETHERING_WIFI, UPSTREAM_IFACE); |
| 318 | |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 319 | doThrow(RemoteException.class).when(mNetd).tetherAddForward(IFACE_NAME, UPSTREAM_IFACE2); |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 320 | |
| 321 | dispatchTetherConnectionChanged(UPSTREAM_IFACE2); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 322 | InOrder inOrder = inOrder(mNetd); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 323 | inOrder.verify(mNetd).ipfwdRemoveInterfaceForward(IFACE_NAME, UPSTREAM_IFACE); |
| 324 | inOrder.verify(mNetd).tetherRemoveForward(IFACE_NAME, UPSTREAM_IFACE); |
| 325 | inOrder.verify(mNetd).tetherAddForward(IFACE_NAME, UPSTREAM_IFACE2); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 326 | inOrder.verify(mNetd).ipfwdRemoveInterfaceForward(IFACE_NAME, UPSTREAM_IFACE2); |
| 327 | inOrder.verify(mNetd).tetherRemoveForward(IFACE_NAME, UPSTREAM_IFACE2); |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 328 | } |
| 329 | |
| 330 | @Test |
| 331 | public void handlesChangingUpstreamInterfaceForwardingFailure() throws Exception { |
| 332 | initTetheredStateMachine(TETHERING_WIFI, UPSTREAM_IFACE); |
| 333 | |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 334 | doThrow(RemoteException.class).when(mNetd).ipfwdAddInterfaceForward( |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 335 | IFACE_NAME, UPSTREAM_IFACE2); |
| 336 | |
| 337 | dispatchTetherConnectionChanged(UPSTREAM_IFACE2); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 338 | InOrder inOrder = inOrder(mNetd); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 339 | inOrder.verify(mNetd).ipfwdRemoveInterfaceForward(IFACE_NAME, UPSTREAM_IFACE); |
| 340 | inOrder.verify(mNetd).tetherRemoveForward(IFACE_NAME, UPSTREAM_IFACE); |
| 341 | inOrder.verify(mNetd).tetherAddForward(IFACE_NAME, UPSTREAM_IFACE2); |
| 342 | inOrder.verify(mNetd).ipfwdAddInterfaceForward(IFACE_NAME, UPSTREAM_IFACE2); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 343 | inOrder.verify(mNetd).ipfwdRemoveInterfaceForward(IFACE_NAME, UPSTREAM_IFACE2); |
| 344 | inOrder.verify(mNetd).tetherRemoveForward(IFACE_NAME, UPSTREAM_IFACE2); |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 345 | } |
| 346 | |
| 347 | @Test |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 348 | public void canUnrequestTetheringWithUpstream() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 349 | initTetheredStateMachine(TETHERING_BLUETOOTH, UPSTREAM_IFACE); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 350 | |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 351 | dispatchCommand(IpServer.CMD_TETHER_UNREQUESTED); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 352 | InOrder inOrder = inOrder(mNetd, mCallback); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 353 | inOrder.verify(mNetd).ipfwdRemoveInterfaceForward(IFACE_NAME, UPSTREAM_IFACE); |
| 354 | inOrder.verify(mNetd).tetherRemoveForward(IFACE_NAME, UPSTREAM_IFACE); |
| 355 | inOrder.verify(mNetd).tetherApplyDnsInterfaces(); |
| 356 | inOrder.verify(mNetd).tetherInterfaceRemove(IFACE_NAME); |
| 357 | inOrder.verify(mNetd).networkRemoveInterface(INetd.LOCAL_NET_ID, IFACE_NAME); |
Remi NGUYEN VAN | d1b51a3 | 2019-01-22 16:13:57 +0900 | [diff] [blame] | 358 | inOrder.verify(mNetd).interfaceSetCfg(argThat(cfg -> IFACE_NAME.equals(cfg.ifName))); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 359 | inOrder.verify(mCallback).updateInterfaceState( |
| 360 | mIpServer, STATE_AVAILABLE, TETHER_ERROR_NO_ERROR); |
| 361 | inOrder.verify(mCallback).updateLinkProperties( |
| 362 | eq(mIpServer), any(LinkProperties.class)); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 363 | verifyNoMoreInteractions(mNetd, mCallback); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 364 | } |
| 365 | |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 366 | @Test |
| 367 | public void interfaceDownLeadsToUnavailable() throws Exception { |
| 368 | for (boolean shouldThrow : new boolean[]{true, false}) { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 369 | initTetheredStateMachine(TETHERING_USB, null); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 370 | |
| 371 | if (shouldThrow) { |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 372 | doThrow(RemoteException.class).when(mNetd).tetherInterfaceRemove(IFACE_NAME); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 373 | } |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 374 | dispatchCommand(IpServer.CMD_INTERFACE_DOWN); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 375 | InOrder usbTeardownOrder = inOrder(mNetd, mCallback); |
| 376 | // Currently IpServer interfaceSetCfg twice to stop IPv4. One just set interface down |
| 377 | // Another one is set IPv4 to 0.0.0.0/0 as clearng ipv4 address. |
| 378 | usbTeardownOrder.verify(mNetd, times(2)).interfaceSetCfg( |
| 379 | argThat(cfg -> IFACE_NAME.equals(cfg.ifName))); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 380 | usbTeardownOrder.verify(mCallback).updateInterfaceState( |
| 381 | mIpServer, STATE_UNAVAILABLE, TETHER_ERROR_NO_ERROR); |
| 382 | usbTeardownOrder.verify(mCallback).updateLinkProperties( |
| 383 | eq(mIpServer), mLinkPropertiesCaptor.capture()); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 384 | assertNoAddressesNorRoutes(mLinkPropertiesCaptor.getValue()); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 385 | } |
| 386 | } |
| 387 | |
| 388 | @Test |
| 389 | public void usbShouldBeTornDownOnTetherError() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 390 | initStateMachine(TETHERING_USB); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 391 | |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 392 | doThrow(RemoteException.class).when(mNetd).tetherInterfaceAdd(IFACE_NAME); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 393 | dispatchCommand(IpServer.CMD_TETHER_REQUESTED, STATE_TETHERED); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 394 | InOrder usbTeardownOrder = inOrder(mNetd, mCallback); |
| 395 | usbTeardownOrder.verify(mNetd).interfaceSetCfg( |
| 396 | argThat(cfg -> IFACE_NAME.equals(cfg.ifName))); |
| 397 | usbTeardownOrder.verify(mNetd).tetherInterfaceAdd(IFACE_NAME); |
| 398 | |
| 399 | usbTeardownOrder.verify(mNetd, times(2)).interfaceSetCfg( |
| 400 | argThat(cfg -> IFACE_NAME.equals(cfg.ifName))); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 401 | usbTeardownOrder.verify(mCallback).updateInterfaceState( |
| 402 | mIpServer, STATE_AVAILABLE, TETHER_ERROR_TETHER_IFACE_ERROR); |
| 403 | usbTeardownOrder.verify(mCallback).updateLinkProperties( |
| 404 | eq(mIpServer), mLinkPropertiesCaptor.capture()); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 405 | assertNoAddressesNorRoutes(mLinkPropertiesCaptor.getValue()); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 406 | } |
| 407 | |
| 408 | @Test |
| 409 | public void shouldTearDownUsbOnUpstreamError() throws Exception { |
Erik Kline | a954be9 | 2017-02-13 17:12:02 +0900 | [diff] [blame] | 410 | initTetheredStateMachine(TETHERING_USB, null); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 411 | |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 412 | doThrow(RemoteException.class).when(mNetd).tetherAddForward(anyString(), anyString()); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 413 | dispatchTetherConnectionChanged(UPSTREAM_IFACE); |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 414 | InOrder usbTeardownOrder = inOrder(mNetd, mCallback); |
| 415 | usbTeardownOrder.verify(mNetd).tetherAddForward(IFACE_NAME, UPSTREAM_IFACE); |
| 416 | |
| 417 | usbTeardownOrder.verify(mNetd, times(2)).interfaceSetCfg( |
| 418 | argThat(cfg -> IFACE_NAME.equals(cfg.ifName))); |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 419 | usbTeardownOrder.verify(mCallback).updateInterfaceState( |
| 420 | mIpServer, STATE_AVAILABLE, TETHER_ERROR_ENABLE_NAT_ERROR); |
| 421 | usbTeardownOrder.verify(mCallback).updateLinkProperties( |
| 422 | eq(mIpServer), mLinkPropertiesCaptor.capture()); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 423 | assertNoAddressesNorRoutes(mLinkPropertiesCaptor.getValue()); |
Christopher Wiley | f972edc | 2016-05-23 16:17:30 -0700 | [diff] [blame] | 424 | } |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 425 | |
Erik Kline | 624bf3d | 2017-02-14 15:55:00 +0900 | [diff] [blame] | 426 | @Test |
| 427 | public void ignoresDuplicateUpstreamNotifications() throws Exception { |
| 428 | initTetheredStateMachine(TETHERING_WIFI, UPSTREAM_IFACE); |
| 429 | |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 430 | verifyNoMoreInteractions(mNetd, mCallback); |
Erik Kline | 624bf3d | 2017-02-14 15:55:00 +0900 | [diff] [blame] | 431 | |
| 432 | for (int i = 0; i < 5; i++) { |
| 433 | dispatchTetherConnectionChanged(UPSTREAM_IFACE); |
junyulai | e3f4143 | 2019-12-03 14:34:13 +0800 | [diff] [blame] | 434 | verifyNoMoreInteractions(mNetd, mCallback); |
Erik Kline | 624bf3d | 2017-02-14 15:55:00 +0900 | [diff] [blame] | 435 | } |
| 436 | } |
| 437 | |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 438 | @Test |
| 439 | public void startsDhcpServer() throws Exception { |
| 440 | initTetheredStateMachine(TETHERING_WIFI, UPSTREAM_IFACE); |
| 441 | dispatchTetherConnectionChanged(UPSTREAM_IFACE); |
| 442 | |
| 443 | assertDhcpStarted(new IpPrefix("192.168.43.0/24")); |
| 444 | } |
| 445 | |
| 446 | @Test |
| 447 | public void startsDhcpServerOnBluetooth() throws Exception { |
| 448 | initTetheredStateMachine(TETHERING_BLUETOOTH, UPSTREAM_IFACE); |
| 449 | dispatchTetherConnectionChanged(UPSTREAM_IFACE); |
| 450 | |
| 451 | assertDhcpStarted(new IpPrefix("192.168.44.0/24")); |
| 452 | } |
| 453 | |
| 454 | @Test |
Jimmy Chen | bcd86d0 | 2019-07-15 18:03:23 +0800 | [diff] [blame] | 455 | public void startsDhcpServerOnWifiP2p() throws Exception { |
| 456 | initTetheredStateMachine(TETHERING_WIFI_P2P, UPSTREAM_IFACE); |
| 457 | dispatchTetherConnectionChanged(UPSTREAM_IFACE); |
| 458 | |
| 459 | assertDhcpStarted(new IpPrefix("192.168.49.0/24")); |
| 460 | } |
| 461 | |
| 462 | @Test |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 463 | public void doesNotStartDhcpServerIfDisabled() throws Exception { |
| 464 | initTetheredStateMachine(TETHERING_WIFI, UPSTREAM_IFACE, true /* usingLegacyDhcp */); |
| 465 | dispatchTetherConnectionChanged(UPSTREAM_IFACE); |
| 466 | |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 467 | verify(mDependencies, never()).makeDhcpServer(any(), any(), any()); |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 468 | } |
| 469 | |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 470 | private void assertDhcpStarted(IpPrefix expectedPrefix) throws Exception { |
| 471 | verify(mDependencies, times(1)).makeDhcpServer(eq(IFACE_NAME), any(), any()); |
| 472 | verify(mDhcpServer, timeout(MAKE_DHCPSERVER_TIMEOUT_MS).times(1)).start(any()); |
| 473 | final DhcpServingParamsParcel params = mDhcpParamsCaptor.getValue(); |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 474 | // Last address byte is random |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 475 | assertTrue(expectedPrefix.contains(intToInet4AddressHTH(params.serverAddr))); |
| 476 | assertEquals(expectedPrefix.getPrefixLength(), params.serverAddrPrefixLength); |
| 477 | assertEquals(1, params.defaultRouters.length); |
| 478 | assertEquals(params.serverAddr, params.defaultRouters[0]); |
| 479 | assertEquals(1, params.dnsServers.length); |
| 480 | assertEquals(params.serverAddr, params.dnsServers[0]); |
Remi NGUYEN VAN | e3bb5c5 | 2018-06-12 15:57:04 +0900 | [diff] [blame] | 481 | assertEquals(DHCP_LEASE_TIME_SECS, params.dhcpLeaseTimeSecs); |
| 482 | } |
| 483 | |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 484 | /** |
| 485 | * Send a command to the state machine under test, and run the event loop to idle. |
| 486 | * |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 487 | * @param command One of the IpServer.CMD_* constants. |
Remi NGUYEN VAN | a911e84 | 2018-03-15 11:57:14 +0900 | [diff] [blame] | 488 | * @param arg1 An additional argument to pass. |
Erik Kline | ea9cc48 | 2017-03-10 19:35:34 +0900 | [diff] [blame] | 489 | */ |
| 490 | private void dispatchCommand(int command, int arg1) { |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 491 | mIpServer.sendMessage(command, arg1); |
Erik Kline | ea9cc48 | 2017-03-10 19:35:34 +0900 | [diff] [blame] | 492 | mLooper.dispatchAll(); |
| 493 | } |
| 494 | |
| 495 | /** |
| 496 | * Send a command to the state machine under test, and run the event loop to idle. |
| 497 | * |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 498 | * @param command One of the IpServer.CMD_* constants. |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 499 | */ |
| 500 | private void dispatchCommand(int command) { |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 501 | mIpServer.sendMessage(command); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 502 | mLooper.dispatchAll(); |
| 503 | } |
| 504 | |
| 505 | /** |
| 506 | * Special override to tell the state machine that the upstream interface has changed. |
| 507 | * |
| 508 | * @see #dispatchCommand(int) |
| 509 | * @param upstreamIface String name of upstream interface (or null) |
| 510 | */ |
| 511 | private void dispatchTetherConnectionChanged(String upstreamIface) { |
Erik Kline | 7a4ccc6 | 2018-08-27 17:26:47 +0900 | [diff] [blame] | 512 | mIpServer.sendMessage(IpServer.CMD_TETHER_CONNECTION_CHANGED, |
Remi NGUYEN VAN | 25a7e4f | 2018-03-09 14:07:18 +0900 | [diff] [blame] | 513 | new InterfaceSet(upstreamIface)); |
Christopher Wiley | 279eca3 | 2016-05-20 13:23:10 -0700 | [diff] [blame] | 514 | mLooper.dispatchAll(); |
Christopher Wiley | 08725a8 | 2016-05-18 16:32:44 -0700 | [diff] [blame] | 515 | } |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 516 | |
| 517 | private void assertIPv4AddressAndDirectlyConnectedRoute(LinkProperties lp) { |
| 518 | // Find the first IPv4 LinkAddress. |
| 519 | LinkAddress addr4 = null; |
| 520 | for (LinkAddress addr : lp.getLinkAddresses()) { |
| 521 | if (!(addr.getAddress() instanceof Inet4Address)) continue; |
| 522 | addr4 = addr; |
| 523 | break; |
| 524 | } |
Remi NGUYEN VAN | 0e3d0923 | 2018-12-04 12:13:09 +0900 | [diff] [blame] | 525 | assertNotNull("missing IPv4 address", addr4); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 526 | |
markchien | 986750b | 2019-12-06 15:24:53 +0800 | [diff] [blame] | 527 | final IpPrefix destination = new IpPrefix(addr4.getAddress(), addr4.getPrefixLength()); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 528 | // Assert the presence of the associated directly connected route. |
markchien | 986750b | 2019-12-06 15:24:53 +0800 | [diff] [blame] | 529 | final RouteInfo directlyConnected = new RouteInfo(destination, null, lp.getInterfaceName(), |
| 530 | RouteInfo.RTN_UNICAST); |
Erik Kline | dd4d582 | 2017-06-12 18:20:08 +0900 | [diff] [blame] | 531 | assertTrue("missing directly connected route: '" + directlyConnected.toString() + "'", |
| 532 | lp.getRoutes().contains(directlyConnected)); |
| 533 | } |
| 534 | |
| 535 | private void assertNoAddressesNorRoutes(LinkProperties lp) { |
| 536 | assertTrue(lp.getLinkAddresses().isEmpty()); |
| 537 | assertTrue(lp.getRoutes().isEmpty()); |
| 538 | // We also check that interface name is non-empty, because we should |
| 539 | // never see an empty interface name in any LinkProperties update. |
| 540 | assertFalse(TextUtils.isEmpty(lp.getInterfaceName())); |
| 541 | } |
markchien | 92b8e7f | 2020-01-07 14:43:17 +0800 | [diff] [blame] | 542 | |
| 543 | private boolean assertContainsFlag(String[] flags, String match) { |
| 544 | for (String flag : flags) { |
| 545 | if (flag.equals(match)) return true; |
| 546 | } |
| 547 | fail("Missing flag: " + match); |
| 548 | return false; |
| 549 | } |
Lorenzo Colitti | 5bce5a1 | 2016-10-28 17:45:55 +0900 | [diff] [blame] | 550 | } |