nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2018 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
Ken Chen | 5471dca | 2019-04-15 15:25:35 +0800 | [diff] [blame] | 17 | #define LOG_TAG "resolv" |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 18 | |
| 19 | #include <gtest/gtest.h> |
| 20 | |
| 21 | #include <android-base/stringprintf.h> |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 22 | #include <arpa/inet.h> |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 23 | #include <netdb.h> |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 24 | #include <netdutils/InternetAddresses.h> |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 25 | |
| 26 | #include "dns_responder.h" |
Bernie Innocenti | e71a28a | 2019-05-29 00:42:35 +0900 | [diff] [blame] | 27 | #include "getaddrinfo.h" |
| 28 | #include "gethnamaddr.h" |
| 29 | #include "resolv_cache.h" |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 30 | #include "stats.pb.h" |
Hungming Chen | 3264747 | 2019-07-05 14:04:51 +0800 | [diff] [blame] | 31 | #include "tests/resolv_test_utils.h" |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 32 | |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 33 | #define NAME(variable) #variable |
| 34 | |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 35 | namespace android { |
| 36 | namespace net { |
| 37 | |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 38 | using android::base::StringPrintf; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 39 | using android::net::NetworkDnsEventReported; |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 40 | using android::netdutils::ScopedAddrinfo; |
| 41 | |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 42 | // Minimize class ResolverTest to be class TestBase because class TestBase doesn't need all member |
| 43 | // functions of class ResolverTest and class DnsResponderClient. |
| 44 | class TestBase : public ::testing::Test { |
| 45 | protected: |
Luke Huang | 9b80e6c | 2019-04-09 17:54:09 +0800 | [diff] [blame] | 46 | void SetUp() override { |
| 47 | // Create cache for test |
| 48 | resolv_create_cache_for_net(TEST_NETID); |
| 49 | } |
| 50 | void TearDown() override { |
| 51 | // Delete cache for test |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 52 | resolv_delete_cache_for_net(TEST_NETID); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 53 | } |
| 54 | |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 55 | int setResolvers() { |
| 56 | const std::vector<std::string> servers = {test::kDefaultListenAddr}; |
| 57 | const std::vector<std::string> domains = {"example.com"}; |
| 58 | const res_params params = { |
| 59 | .sample_validity = 300, |
| 60 | .success_threshold = 25, |
| 61 | .min_samples = 8, |
| 62 | .max_samples = 8, |
| 63 | .base_timeout_msec = 1000, |
| 64 | .retry_count = 2, |
| 65 | }; |
| 66 | return resolv_set_nameservers(TEST_NETID, servers, domains, params); |
| 67 | } |
| 68 | |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 69 | const android_net_context mNetcontext = { |
| 70 | .app_netid = TEST_NETID, |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 71 | .app_mark = MARK_UNSET, |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 72 | .dns_netid = TEST_NETID, |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 73 | .dns_mark = MARK_UNSET, |
| 74 | .uid = NET_CONTEXT_INVALID_UID, |
| 75 | }; |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 76 | }; |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 77 | |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 78 | class ResolvGetAddrInfoTest : public TestBase {}; |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 79 | class GetHostByNameForNetContextTest : public TestBase {}; |
| 80 | |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 81 | TEST_F(ResolvGetAddrInfoTest, InvalidParameters) { |
| 82 | // Both null "netcontext" and null "res" of resolv_getaddrinfo() are not tested |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 83 | // here because they are checked by assert() without returning any error number. |
| 84 | |
| 85 | // Invalid hostname and servname. |
| 86 | // Both hostname and servname are null pointers. Expect error number EAI_NONAME. |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 87 | { |
| 88 | addrinfo* result = nullptr; |
| 89 | NetworkDnsEventReported event; |
| 90 | int rv = resolv_getaddrinfo(nullptr /*hostname*/, nullptr /*servname*/, nullptr /*hints*/, |
| 91 | &mNetcontext, &result, &event); |
| 92 | ScopedAddrinfo result_cleanup(result); |
| 93 | EXPECT_EQ(EAI_NONAME, rv); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 94 | } |
| 95 | |
| 96 | // Invalid hints. |
| 97 | // These place holders are used to test function call with unrequired parameters. |
| 98 | // The content is not important because function call returns error directly if |
| 99 | // there have any unrequired parameter. |
| 100 | char placeholder_cname[] = "invalid_cname"; |
| 101 | sockaddr placeholder_addr = {}; |
| 102 | addrinfo placeholder_next = {}; |
| 103 | static const struct TestConfig { |
| 104 | int ai_flags; |
| 105 | socklen_t ai_addrlen; |
| 106 | char* ai_canonname; |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 107 | sockaddr* ai_addr; |
| 108 | addrinfo* ai_next; |
Bernie Innocenti | 7916c6a | 2019-04-25 15:16:51 +0900 | [diff] [blame] | 109 | |
| 110 | int expected_eai_error; |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 111 | |
| 112 | std::string asParameters() const { |
| 113 | return StringPrintf("0x%x/%u/%s/%p/%p", ai_flags, ai_addrlen, |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 114 | ai_canonname ? ai_canonname : "(null)", (void*)ai_addr, |
| 115 | (void*)ai_next); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 116 | } |
| 117 | } testConfigs[]{ |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 118 | {0, sizeof(in_addr) /*bad*/, nullptr, nullptr, nullptr, EAI_BADHINTS}, |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 119 | {0, 0, placeholder_cname /*bad*/, nullptr, nullptr, EAI_BADHINTS}, |
| 120 | {0, 0, nullptr, &placeholder_addr /*bad*/, nullptr, EAI_BADHINTS}, |
| 121 | {0, 0, nullptr, nullptr, &placeholder_next /*bad*/, EAI_BADHINTS}, |
| 122 | {AI_ALL /*bad*/, 0, nullptr, nullptr, nullptr, EAI_BADFLAGS}, |
| 123 | {AI_V4MAPPED_CFG /*bad*/, 0, nullptr, nullptr, nullptr, EAI_BADFLAGS}, |
| 124 | {AI_V4MAPPED /*bad*/, 0, nullptr, nullptr, nullptr, EAI_BADFLAGS}, |
| 125 | {AI_DEFAULT /*bad*/, 0, nullptr, nullptr, nullptr, EAI_BADFLAGS}, |
| 126 | }; |
| 127 | |
| 128 | for (const auto& config : testConfigs) { |
| 129 | SCOPED_TRACE(config.asParameters()); |
| 130 | |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 131 | addrinfo* result = nullptr; |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 132 | // In current test configuration set, ai_family, ai_protocol and ai_socktype are not |
| 133 | // checked because other fields cause hints error check failed first. |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 134 | const addrinfo hints = { |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 135 | .ai_flags = config.ai_flags, |
| 136 | .ai_family = AF_UNSPEC, |
| 137 | .ai_socktype = ANY, |
| 138 | .ai_protocol = ANY, |
| 139 | .ai_addrlen = config.ai_addrlen, |
| 140 | .ai_canonname = config.ai_canonname, |
| 141 | .ai_addr = config.ai_addr, |
| 142 | .ai_next = config.ai_next, |
| 143 | }; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 144 | NetworkDnsEventReported event; |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 145 | int rv = resolv_getaddrinfo("localhost", nullptr /*servname*/, &hints, &mNetcontext, |
| 146 | &result, &event); |
| 147 | ScopedAddrinfo result_cleanup(result); |
Bernie Innocenti | 7916c6a | 2019-04-25 15:16:51 +0900 | [diff] [blame] | 148 | EXPECT_EQ(config.expected_eai_error, rv); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 149 | } |
| 150 | } |
| 151 | |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 152 | TEST_F(ResolvGetAddrInfoTest, InvalidParameters_Family) { |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 153 | for (int family = 0; family < AF_MAX; ++family) { |
| 154 | if (family == AF_UNSPEC || family == AF_INET || family == AF_INET6) { |
| 155 | continue; // skip supported family |
| 156 | } |
| 157 | SCOPED_TRACE(StringPrintf("family: %d", family)); |
| 158 | |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 159 | addrinfo* result = nullptr; |
| 160 | const addrinfo hints = { |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 161 | .ai_family = family, // unsupported family |
| 162 | }; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 163 | NetworkDnsEventReported event; |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 164 | int rv = resolv_getaddrinfo("localhost", nullptr /*servname*/, &hints, &mNetcontext, |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 165 | &result, &event); |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 166 | ScopedAddrinfo result_cleanup(result); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 167 | EXPECT_EQ(EAI_FAMILY, rv); |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 168 | } |
| 169 | } |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 170 | |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 171 | TEST_F(ResolvGetAddrInfoTest, InvalidParameters_SocketType) { |
| 172 | for (const auto& family : {AF_INET, AF_INET6, AF_UNSPEC}) { |
| 173 | for (int protocol = 0; protocol < IPPROTO_MAX; ++protocol) { |
| 174 | // Socket types which are not in explore_options. |
| 175 | for (const auto& socktype : {SOCK_RDM, SOCK_SEQPACKET, SOCK_DCCP, SOCK_PACKET}) { |
| 176 | const addrinfo hints = { |
| 177 | .ai_family = family, |
| 178 | .ai_protocol = protocol, |
| 179 | .ai_socktype = socktype, |
| 180 | }; |
| 181 | for (const char* service : {static_cast<const char*>(nullptr), // service is null |
| 182 | "80", |
| 183 | "", // empty service name |
| 184 | "ftp", |
| 185 | "65536", // out of valid port range from 0 to 65535 |
| 186 | "invalid"}) { |
| 187 | SCOPED_TRACE(StringPrintf("family: %d, socktype: %d, protocol: %d, service: %s", |
| 188 | family, socktype, protocol, |
| 189 | service ? service : "service is nullptr")); |
| 190 | addrinfo* result = nullptr; |
| 191 | NetworkDnsEventReported event; |
| 192 | int rv = resolv_getaddrinfo("localhost", service, &hints, &mNetcontext, &result, |
| 193 | &event); |
| 194 | ScopedAddrinfo result_cleanup(result); |
| 195 | EXPECT_EQ(EAI_SOCKTYPE, rv); |
| 196 | } |
| 197 | } |
| 198 | } |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 199 | } |
| 200 | } |
| 201 | |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 202 | TEST_F(ResolvGetAddrInfoTest, InvalidParameters_MeaningfulSocktypeAndProtocolCombination) { |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 203 | static const int families[] = {PF_INET, PF_INET6, PF_UNSPEC}; |
| 204 | // Skip to test socket type SOCK_RAW in meaningful combination (explore_options[]) of |
| 205 | // system\netd\resolv\getaddrinfo.cpp. In explore_options[], the socket type SOCK_RAW always |
| 206 | // comes with protocol ANY which causes skipping meaningful socktype/protocol combination |
| 207 | // check. So it nerver returns error number EAI_BADHINTS which we want to test in this test |
| 208 | // case. |
| 209 | static const int socktypes[] = {SOCK_STREAM, SOCK_DGRAM}; |
| 210 | |
| 211 | // If both socktype/protocol are specified, check non-meaningful combination returns |
| 212 | // expected error number EAI_BADHINTS. See meaningful combination in explore_options[] of |
| 213 | // system\netd\resolv\getaddrinfo.cpp. |
| 214 | for (const auto& family : families) { |
| 215 | for (const auto& socktype : socktypes) { |
| 216 | for (int protocol = 0; protocol < IPPROTO_MAX; ++protocol) { |
| 217 | SCOPED_TRACE(StringPrintf("family: %d, socktype: %d, protocol: %d", family, |
| 218 | socktype, protocol)); |
| 219 | |
| 220 | // Both socktype/protocol need to be specified. |
| 221 | if (!socktype || !protocol) continue; |
| 222 | |
| 223 | // Skip meaningful combination in explore_options[] of |
| 224 | // system\netd\resolv\getaddrinfo.cpp. |
| 225 | if ((family == AF_INET6 && socktype == SOCK_DGRAM && protocol == IPPROTO_UDP) || |
| 226 | (family == AF_INET6 && socktype == SOCK_STREAM && protocol == IPPROTO_TCP) || |
| 227 | (family == AF_INET && socktype == SOCK_DGRAM && protocol == IPPROTO_UDP) || |
| 228 | (family == AF_INET && socktype == SOCK_STREAM && protocol == IPPROTO_TCP) || |
| 229 | (family == AF_UNSPEC && socktype == SOCK_DGRAM && protocol == IPPROTO_UDP) || |
| 230 | (family == AF_UNSPEC && socktype == SOCK_STREAM && protocol == IPPROTO_TCP)) { |
| 231 | continue; |
| 232 | } |
| 233 | |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 234 | addrinfo* result = nullptr; |
| 235 | const addrinfo hints = { |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 236 | .ai_family = family, |
| 237 | .ai_protocol = protocol, |
| 238 | .ai_socktype = socktype, |
| 239 | }; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 240 | NetworkDnsEventReported event; |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 241 | int rv = resolv_getaddrinfo("localhost", nullptr /*servname*/, &hints, &mNetcontext, |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 242 | &result, &event); |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 243 | ScopedAddrinfo result_cleanup(result); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 244 | EXPECT_EQ(EAI_BADHINTS, rv); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 245 | } |
| 246 | } |
| 247 | } |
| 248 | } |
| 249 | |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 250 | // The test configs are used for verifying the error path of get_port(). |
| 251 | // Note that the EAI_SOCKTYPE verification are moved to an independent |
| 252 | // test case because validateHints() verify invalid socket type early now. |
| 253 | // See also InvalidParameters_SocketType. |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 254 | TEST_F(ResolvGetAddrInfoTest, InvalidParameters_PortNameAndNumber) { |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 255 | constexpr char http_portno[] = "80"; |
| 256 | constexpr char invalid_portno[] = "65536"; // out of valid port range from 0 to 65535 |
| 257 | constexpr char http_portname[] = "http"; |
| 258 | constexpr char invalid_portname[] = "invalid_portname"; |
| 259 | |
| 260 | static const struct TestConfig { |
| 261 | int ai_flags; |
| 262 | int ai_family; |
| 263 | int ai_socktype; |
| 264 | const char* servname; |
Bernie Innocenti | 7916c6a | 2019-04-25 15:16:51 +0900 | [diff] [blame] | 265 | |
| 266 | int expected_eai_error; |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 267 | |
| 268 | std::string asParameters() const { |
| 269 | return StringPrintf("0x%x/%d/%d/%s", ai_flags, ai_family, ai_socktype, |
| 270 | servname ? servname : "(null)"); |
| 271 | } |
| 272 | } testConfigs[]{ |
| 273 | {0, AF_INET, SOCK_RAW /*bad*/, http_portno, EAI_SERVICE}, |
| 274 | {0, AF_INET6, SOCK_RAW /*bad*/, http_portno, EAI_SERVICE}, |
| 275 | {0, AF_UNSPEC, SOCK_RAW /*bad*/, http_portno, EAI_SERVICE}, |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 276 | {0, AF_INET, ANY, invalid_portno /*bad*/, EAI_SERVICE}, |
| 277 | {0, AF_INET, SOCK_STREAM, invalid_portno /*bad*/, EAI_SERVICE}, |
| 278 | {0, AF_INET, SOCK_DGRAM, invalid_portno /*bad*/, EAI_SERVICE}, |
| 279 | {0, AF_INET6, ANY, invalid_portno /*bad*/, EAI_SERVICE}, |
| 280 | {0, AF_INET6, SOCK_STREAM, invalid_portno /*bad*/, EAI_SERVICE}, |
| 281 | {0, AF_INET6, SOCK_DGRAM, invalid_portno /*bad*/, EAI_SERVICE}, |
| 282 | {0, AF_UNSPEC, ANY, invalid_portno /*bad*/, EAI_SERVICE}, |
| 283 | {0, AF_UNSPEC, SOCK_STREAM, invalid_portno /*bad*/, EAI_SERVICE}, |
| 284 | {0, AF_UNSPEC, SOCK_DGRAM, invalid_portno /*bad*/, EAI_SERVICE}, |
| 285 | {AI_NUMERICSERV, AF_INET, ANY, http_portname /*bad*/, EAI_NONAME}, |
| 286 | {AI_NUMERICSERV, AF_INET, SOCK_STREAM, http_portname /*bad*/, EAI_NONAME}, |
| 287 | {AI_NUMERICSERV, AF_INET, SOCK_DGRAM, http_portname /*bad*/, EAI_NONAME}, |
| 288 | {AI_NUMERICSERV, AF_INET6, ANY, http_portname /*bad*/, EAI_NONAME}, |
| 289 | {AI_NUMERICSERV, AF_INET6, SOCK_STREAM, http_portname /*bad*/, EAI_NONAME}, |
| 290 | {AI_NUMERICSERV, AF_INET6, SOCK_DGRAM, http_portname /*bad*/, EAI_NONAME}, |
| 291 | {AI_NUMERICSERV, AF_UNSPEC, ANY, http_portname /*bad*/, EAI_NONAME}, |
| 292 | {AI_NUMERICSERV, AF_UNSPEC, SOCK_STREAM, http_portname /*bad*/, EAI_NONAME}, |
| 293 | {AI_NUMERICSERV, AF_UNSPEC, SOCK_DGRAM, http_portname /*bad*/, EAI_NONAME}, |
| 294 | {0, AF_INET, ANY, invalid_portname /*bad*/, EAI_SERVICE}, |
| 295 | {0, AF_INET, SOCK_STREAM, invalid_portname /*bad*/, EAI_SERVICE}, |
| 296 | {0, AF_INET, SOCK_DGRAM, invalid_portname /*bad*/, EAI_SERVICE}, |
| 297 | {0, AF_INET6, ANY, invalid_portname /*bad*/, EAI_SERVICE}, |
| 298 | {0, AF_INET6, SOCK_STREAM, invalid_portname /*bad*/, EAI_SERVICE}, |
| 299 | {0, AF_INET6, SOCK_DGRAM, invalid_portname /*bad*/, EAI_SERVICE}, |
| 300 | {0, AF_UNSPEC, ANY, invalid_portname /*bad*/, EAI_SERVICE}, |
| 301 | {0, AF_UNSPEC, SOCK_STREAM, invalid_portname /*bad*/, EAI_SERVICE}, |
| 302 | {0, AF_UNSPEC, SOCK_DGRAM, invalid_portname /*bad*/, EAI_SERVICE}, |
| 303 | }; |
| 304 | |
| 305 | for (const auto& config : testConfigs) { |
| 306 | const std::string testParameters = config.asParameters(); |
| 307 | SCOPED_TRACE(testParameters); |
| 308 | |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 309 | const addrinfo hints = { |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 310 | .ai_flags = config.ai_flags, |
| 311 | .ai_family = config.ai_family, |
| 312 | .ai_socktype = config.ai_socktype, |
| 313 | }; |
| 314 | |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 315 | addrinfo* result = nullptr; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 316 | NetworkDnsEventReported event; |
| 317 | int rv = resolv_getaddrinfo("localhost", config.servname, &hints, &mNetcontext, &result, |
| 318 | &event); |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 319 | ScopedAddrinfo result_cleanup(result); |
Bernie Innocenti | 7916c6a | 2019-04-25 15:16:51 +0900 | [diff] [blame] | 320 | EXPECT_EQ(config.expected_eai_error, rv); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 321 | } |
| 322 | } |
| 323 | |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 324 | TEST_F(ResolvGetAddrInfoTest, AlphabeticalHostname_NoData) { |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 325 | constexpr char v4_host_name[] = "v4only.example.com."; |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 326 | test::DNSResponder dns; |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 327 | dns.addMapping(v4_host_name, ns_type::ns_t_a, "1.2.3.3"); |
| 328 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 329 | ASSERT_EQ(0, setResolvers()); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 330 | |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 331 | // Want AAAA answer but DNS server has A answer only. |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 332 | addrinfo* result = nullptr; |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 333 | const addrinfo hints = {.ai_family = AF_INET6}; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 334 | NetworkDnsEventReported event; |
| 335 | int rv = resolv_getaddrinfo("v4only", nullptr, &hints, &mNetcontext, &result, &event); |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 336 | ScopedAddrinfo result_cleanup(result); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 337 | EXPECT_LE(1U, GetNumQueries(dns, v4_host_name)); |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 338 | EXPECT_EQ(nullptr, result); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 339 | EXPECT_EQ(EAI_NODATA, rv); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 340 | } |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 341 | |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 342 | TEST_F(ResolvGetAddrInfoTest, AlphabeticalHostname) { |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 343 | constexpr char host_name[] = "sawadee.example.com."; |
| 344 | constexpr char v4addr[] = "1.2.3.4"; |
| 345 | constexpr char v6addr[] = "::1.2.3.4"; |
| 346 | |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 347 | test::DNSResponder dns; |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 348 | dns.addMapping(host_name, ns_type::ns_t_a, v4addr); |
| 349 | dns.addMapping(host_name, ns_type::ns_t_aaaa, v6addr); |
| 350 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 351 | ASSERT_EQ(0, setResolvers()); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 352 | |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 353 | static const struct TestConfig { |
| 354 | int ai_family; |
| 355 | const std::string expected_addr; |
| 356 | } testConfigs[]{ |
| 357 | {AF_INET, v4addr}, |
| 358 | {AF_INET6, v6addr}, |
| 359 | }; |
| 360 | |
| 361 | for (const auto& config : testConfigs) { |
| 362 | SCOPED_TRACE(StringPrintf("family: %d", config.ai_family)); |
| 363 | dns.clearQueries(); |
| 364 | |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 365 | addrinfo* result = nullptr; |
| 366 | const addrinfo hints = {.ai_family = config.ai_family}; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 367 | NetworkDnsEventReported event; |
| 368 | int rv = resolv_getaddrinfo("sawadee", nullptr, &hints, &mNetcontext, &result, &event); |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 369 | ScopedAddrinfo result_cleanup(result); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 370 | EXPECT_EQ(0, rv); |
| 371 | EXPECT_TRUE(result != nullptr); |
| 372 | EXPECT_EQ(1U, GetNumQueries(dns, host_name)); |
| 373 | EXPECT_EQ(config.expected_addr, ToString(result)); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 374 | } |
| 375 | } |
| 376 | |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 377 | TEST_F(ResolvGetAddrInfoTest, IllegalHostname) { |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 378 | test::DNSResponder dns; |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 379 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 380 | ASSERT_EQ(0, setResolvers()); |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 381 | |
| 382 | // Illegal hostname is verified by res_hnok() in system/netd/resolv/res_comp.cpp. |
| 383 | static constexpr char const* illegalHostnames[] = { |
| 384 | kBadCharAfterPeriodHost, |
| 385 | kBadCharBeforePeriodHost, |
| 386 | kBadCharAtTheEndHost, |
| 387 | kBadCharInTheMiddleOfLabelHost, |
| 388 | }; |
| 389 | |
| 390 | for (const auto& hostname : illegalHostnames) { |
| 391 | // Expect to get no address because hostname format is illegal. |
| 392 | // |
| 393 | // Ex: |
| 394 | // ANSWER SECTION: |
| 395 | // a.ex^ample.com. IN A 1.2.3.3 |
| 396 | // a.ex^ample.com. IN AAAA 2001:db8::42 |
| 397 | // |
| 398 | // In this example, querying "a.ex^ample.com" should get no address because |
| 399 | // "a.ex^ample.com" has an illegal char '^' in the middle of label. |
| 400 | dns.addMapping(hostname, ns_type::ns_t_a, "1.2.3.3"); |
| 401 | dns.addMapping(hostname, ns_type::ns_t_aaaa, "2001:db8::42"); |
| 402 | |
| 403 | for (const auto& family : {AF_INET, AF_INET6, AF_UNSPEC}) { |
| 404 | SCOPED_TRACE(StringPrintf("family: %d, config.name: %s", family, hostname)); |
| 405 | |
| 406 | addrinfo* res = nullptr; |
| 407 | const addrinfo hints = {.ai_family = family}; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 408 | NetworkDnsEventReported event; |
| 409 | int rv = resolv_getaddrinfo(hostname, nullptr, &hints, &mNetcontext, &res, &event); |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 410 | ScopedAddrinfo result(res); |
| 411 | EXPECT_EQ(nullptr, result); |
| 412 | EXPECT_EQ(EAI_FAIL, rv); |
| 413 | } |
| 414 | } |
| 415 | } |
| 416 | |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 417 | TEST_F(ResolvGetAddrInfoTest, ServerResponseError) { |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 418 | constexpr char host_name[] = "hello.example.com."; |
| 419 | |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 420 | static const struct TestConfig { |
| 421 | ns_rcode rcode; |
Bernie Innocenti | 7916c6a | 2019-04-25 15:16:51 +0900 | [diff] [blame] | 422 | int expected_eai_error; |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 423 | |
| 424 | // Only test failure RCODE [1..5] in RFC 1035 section 4.1.1 and skip successful RCODE 0 |
| 425 | // which means no error. |
| 426 | } testConfigs[]{ |
| 427 | // clang-format off |
Bernie Innocenti | 7916c6a | 2019-04-25 15:16:51 +0900 | [diff] [blame] | 428 | {ns_rcode::ns_r_formerr, EAI_FAIL}, |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 429 | {ns_rcode::ns_r_servfail, EAI_AGAIN}, |
| 430 | {ns_rcode::ns_r_nxdomain, EAI_NODATA}, |
Bernie Innocenti | 7916c6a | 2019-04-25 15:16:51 +0900 | [diff] [blame] | 431 | {ns_rcode::ns_r_notimpl, EAI_FAIL}, |
| 432 | {ns_rcode::ns_r_refused, EAI_FAIL}, |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 433 | // clang-format on |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 434 | }; |
| 435 | |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 436 | for (const auto& config : testConfigs) { |
| 437 | SCOPED_TRACE(StringPrintf("rcode: %d", config.rcode)); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 438 | |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 439 | test::DNSResponder dns(config.rcode); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 440 | dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.4"); |
| 441 | dns.setResponseProbability(0.0); // always ignore requests and response preset rcode |
| 442 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 443 | ASSERT_EQ(0, setResolvers()); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 444 | |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 445 | addrinfo* result = nullptr; |
| 446 | const addrinfo hints = {.ai_family = AF_UNSPEC}; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 447 | NetworkDnsEventReported event; |
| 448 | int rv = resolv_getaddrinfo(host_name, nullptr, &hints, &mNetcontext, &result, &event); |
Bernie Innocenti | 7916c6a | 2019-04-25 15:16:51 +0900 | [diff] [blame] | 449 | EXPECT_EQ(config.expected_eai_error, rv); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 450 | } |
| 451 | } |
| 452 | |
| 453 | // TODO: Add private DNS server timeout test. |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 454 | TEST_F(ResolvGetAddrInfoTest, ServerTimeout) { |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 455 | constexpr char host_name[] = "hello.example.com."; |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 456 | test::DNSResponder dns(static_cast<ns_rcode>(-1) /*no response*/); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 457 | dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.4"); |
| 458 | dns.setResponseProbability(0.0); // always ignore requests and don't response |
| 459 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 460 | ASSERT_EQ(0, setResolvers()); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 461 | |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 462 | addrinfo* result = nullptr; |
| 463 | const addrinfo hints = {.ai_family = AF_UNSPEC}; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 464 | NetworkDnsEventReported event; |
| 465 | int rv = resolv_getaddrinfo("hello", nullptr, &hints, &mNetcontext, &result, &event); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 466 | EXPECT_EQ(NETD_RESOLV_TIMEOUT, rv); |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 467 | } |
| 468 | |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 469 | TEST_F(ResolvGetAddrInfoTest, CnamesNoIpAddress) { |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 470 | constexpr char ACNAME[] = "acname"; // expect a cname in answer |
| 471 | constexpr char CNAMES[] = "cnames"; // expect cname chain in answer |
| 472 | |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 473 | test::DNSResponder dns; |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 474 | dns.addMapping("cnames.example.com.", ns_type::ns_t_cname, "acname.example.com."); |
| 475 | dns.addMapping("acname.example.com.", ns_type::ns_t_cname, "hello.example.com."); |
| 476 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 477 | ASSERT_EQ(0, setResolvers()); |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 478 | |
| 479 | static const struct TestConfig { |
| 480 | const char* name; |
| 481 | int family; |
| 482 | } testConfigs[]{ |
| 483 | // clang-format off |
| 484 | {ACNAME, AF_INET}, |
| 485 | {ACNAME, AF_INET6}, |
| 486 | {ACNAME, AF_UNSPEC}, |
| 487 | {CNAMES, AF_INET}, |
| 488 | {CNAMES, AF_INET6}, |
| 489 | {CNAMES, AF_UNSPEC}, |
| 490 | // clang-format on |
| 491 | }; |
| 492 | |
| 493 | for (const auto& config : testConfigs) { |
| 494 | SCOPED_TRACE( |
| 495 | StringPrintf("config.family: %d, config.name: %s", config.family, config.name)); |
| 496 | |
| 497 | addrinfo* res = nullptr; |
| 498 | const addrinfo hints = {.ai_family = config.family}; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 499 | NetworkDnsEventReported event; |
| 500 | int rv = resolv_getaddrinfo(config.name, nullptr, &hints, &mNetcontext, &res, &event); |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 501 | ScopedAddrinfo result(res); |
| 502 | EXPECT_EQ(nullptr, result); |
| 503 | EXPECT_EQ(EAI_FAIL, rv); |
| 504 | } |
| 505 | } |
| 506 | |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 507 | TEST_F(ResolvGetAddrInfoTest, CnamesBrokenChainByIllegalCname) { |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 508 | test::DNSResponder dns; |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 509 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 510 | ASSERT_EQ(0, setResolvers()); |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 511 | |
| 512 | static const struct TestConfig { |
| 513 | const char* name; |
| 514 | const char* cname; |
| 515 | std::string asHostName() const { return StringPrintf("%s.example.com.", name); } |
| 516 | |
| 517 | // Illegal cname is verified by res_hnok() in system/netd/resolv/res_comp.cpp. |
| 518 | } testConfigs[]{ |
| 519 | // clang-format off |
| 520 | {NAME(kBadCharAfterPeriodHost), kBadCharAfterPeriodHost}, |
| 521 | {NAME(kBadCharBeforePeriodHost), kBadCharBeforePeriodHost}, |
| 522 | {NAME(kBadCharAtTheEndHost), kBadCharAtTheEndHost}, |
| 523 | {NAME(kBadCharInTheMiddleOfLabelHost), kBadCharInTheMiddleOfLabelHost}, |
| 524 | // clang-format on |
| 525 | }; |
| 526 | |
| 527 | for (const auto& config : testConfigs) { |
| 528 | const std::string testHostName = config.asHostName(); |
| 529 | |
| 530 | // Expect to get no address because the cname chain is broken by an illegal cname format. |
| 531 | // |
| 532 | // Ex: |
| 533 | // ANSWER SECTION: |
| 534 | // hello.example.com. IN CNAME a.ex^ample.com. |
| 535 | // a.ex^ample.com. IN A 1.2.3.3 |
| 536 | // a.ex^ample.com. IN AAAA 2001:db8::42 |
| 537 | // |
| 538 | // In this example, querying hello.example.com should get no address because |
| 539 | // "a.ex^ample.com" has an illegal char '^' in the middle of label. |
| 540 | dns.addMapping(testHostName.c_str(), ns_type::ns_t_cname, config.cname); |
| 541 | dns.addMapping(config.cname, ns_type::ns_t_a, "1.2.3.3"); |
| 542 | dns.addMapping(config.cname, ns_type::ns_t_aaaa, "2001:db8::42"); |
| 543 | |
| 544 | for (const auto& family : {AF_INET, AF_INET6, AF_UNSPEC}) { |
| 545 | SCOPED_TRACE( |
| 546 | StringPrintf("family: %d, testHostName: %s", family, testHostName.c_str())); |
| 547 | |
| 548 | addrinfo* res = nullptr; |
| 549 | const addrinfo hints = {.ai_family = family}; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 550 | NetworkDnsEventReported event; |
| 551 | int rv = resolv_getaddrinfo(config.name, nullptr, &hints, &mNetcontext, &res, &event); |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 552 | ScopedAddrinfo result(res); |
| 553 | EXPECT_EQ(nullptr, result); |
| 554 | EXPECT_EQ(EAI_FAIL, rv); |
| 555 | } |
| 556 | } |
| 557 | } |
| 558 | |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 559 | TEST_F(ResolvGetAddrInfoTest, CnamesInfiniteLoop) { |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 560 | test::DNSResponder dns; |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 561 | dns.addMapping("hello.example.com.", ns_type::ns_t_cname, "a.example.com."); |
| 562 | dns.addMapping("a.example.com.", ns_type::ns_t_cname, "hello.example.com."); |
| 563 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 564 | ASSERT_EQ(0, setResolvers()); |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 565 | |
| 566 | for (const auto& family : {AF_INET, AF_INET6, AF_UNSPEC}) { |
| 567 | SCOPED_TRACE(StringPrintf("family: %d", family)); |
| 568 | |
| 569 | addrinfo* res = nullptr; |
| 570 | const addrinfo hints = {.ai_family = family}; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 571 | NetworkDnsEventReported event; |
| 572 | int rv = resolv_getaddrinfo("hello", nullptr, &hints, &mNetcontext, &res, &event); |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 573 | ScopedAddrinfo result(res); |
| 574 | EXPECT_EQ(nullptr, result); |
| 575 | EXPECT_EQ(EAI_FAIL, rv); |
| 576 | } |
| 577 | } |
| 578 | |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 579 | TEST_F(GetHostByNameForNetContextTest, AlphabeticalHostname) { |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 580 | constexpr char host_name[] = "jiababuei.example.com."; |
| 581 | constexpr char v4addr[] = "1.2.3.4"; |
| 582 | constexpr char v6addr[] = "::1.2.3.4"; |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 583 | |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 584 | test::DNSResponder dns; |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 585 | dns.addMapping(host_name, ns_type::ns_t_a, v4addr); |
| 586 | dns.addMapping(host_name, ns_type::ns_t_aaaa, v6addr); |
| 587 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 588 | ASSERT_EQ(0, setResolvers()); |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 589 | |
| 590 | static const struct TestConfig { |
| 591 | int ai_family; |
| 592 | const std::string expected_addr; |
| 593 | } testConfigs[]{ |
| 594 | {AF_INET, v4addr}, |
| 595 | {AF_INET6, v6addr}, |
| 596 | }; |
| 597 | |
| 598 | for (const auto& config : testConfigs) { |
| 599 | SCOPED_TRACE(StringPrintf("family: %d", config.ai_family)); |
| 600 | dns.clearQueries(); |
| 601 | |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 602 | hostent* hp = nullptr; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 603 | NetworkDnsEventReported event; |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 604 | int rv = android_gethostbynamefornetcontext("jiababuei", config.ai_family, &mNetcontext, |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 605 | &hp, &event); |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 606 | EXPECT_EQ(0, rv); |
| 607 | EXPECT_TRUE(hp != nullptr); |
| 608 | EXPECT_EQ(1U, GetNumQueries(dns, host_name)); |
| 609 | EXPECT_EQ(config.expected_addr, ToString(hp)); |
| 610 | } |
| 611 | } |
| 612 | |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 613 | TEST_F(GetHostByNameForNetContextTest, IllegalHostname) { |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 614 | test::DNSResponder dns; |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 615 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 616 | ASSERT_EQ(0, setResolvers()); |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 617 | |
| 618 | // Illegal hostname is verified by res_hnok() in system/netd/resolv/res_comp.cpp. |
| 619 | static constexpr char const* illegalHostnames[] = { |
| 620 | kBadCharAfterPeriodHost, |
| 621 | kBadCharBeforePeriodHost, |
| 622 | kBadCharAtTheEndHost, |
| 623 | kBadCharInTheMiddleOfLabelHost, |
| 624 | }; |
| 625 | |
| 626 | for (const auto& hostname : illegalHostnames) { |
| 627 | // Expect to get no address because hostname format is illegal. |
| 628 | // |
| 629 | // Ex: |
| 630 | // ANSWER SECTION: |
| 631 | // a.ex^ample.com. IN A 1.2.3.3 |
| 632 | // a.ex^ample.com. IN AAAA 2001:db8::42 |
| 633 | // |
| 634 | // In this example, querying "a.ex^ample.com" should get no address because |
| 635 | // "a.ex^ample.com" has an illegal char '^' in the middle of label. |
| 636 | dns.addMapping(hostname, ns_type::ns_t_a, "1.2.3.3"); |
| 637 | dns.addMapping(hostname, ns_type::ns_t_aaaa, "2001:db8::42"); |
| 638 | |
| 639 | for (const auto& family : {AF_INET, AF_INET6}) { |
| 640 | SCOPED_TRACE(StringPrintf("family: %d, config.name: %s", family, hostname)); |
| 641 | |
| 642 | struct hostent* hp = nullptr; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 643 | NetworkDnsEventReported event; |
| 644 | int rv = |
| 645 | android_gethostbynamefornetcontext(hostname, family, &mNetcontext, &hp, &event); |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 646 | EXPECT_EQ(nullptr, hp); |
| 647 | EXPECT_EQ(EAI_FAIL, rv); |
| 648 | } |
| 649 | } |
| 650 | } |
| 651 | |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 652 | TEST_F(GetHostByNameForNetContextTest, NoData) { |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 653 | constexpr char v4_host_name[] = "v4only.example.com."; |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 654 | |
| 655 | test::DNSResponder dns; |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 656 | dns.addMapping(v4_host_name, ns_type::ns_t_a, "1.2.3.3"); |
| 657 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 658 | ASSERT_EQ(0, setResolvers()); |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 659 | dns.clearQueries(); |
| 660 | |
| 661 | // Want AAAA answer but DNS server has A answer only. |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 662 | hostent* hp = nullptr; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 663 | NetworkDnsEventReported event; |
| 664 | int rv = android_gethostbynamefornetcontext("v4only", AF_INET6, &mNetcontext, &hp, &event); |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 665 | EXPECT_LE(1U, GetNumQueries(dns, v4_host_name)); |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 666 | EXPECT_EQ(nullptr, hp); |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 667 | EXPECT_EQ(EAI_NODATA, rv); |
| 668 | } |
| 669 | |
| 670 | TEST_F(GetHostByNameForNetContextTest, ServerResponseError) { |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 671 | constexpr char host_name[] = "hello.example.com."; |
| 672 | |
| 673 | static const struct TestConfig { |
| 674 | ns_rcode rcode; |
Bernie Innocenti | 7916c6a | 2019-04-25 15:16:51 +0900 | [diff] [blame] | 675 | int expected_eai_error; // expected result |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 676 | |
| 677 | // Only test failure RCODE [1..5] in RFC 1035 section 4.1.1 and skip successful RCODE 0 |
| 678 | // which means no error. Note that the return error codes aren't mapped by rcode in the |
| 679 | // test case SERVFAIL, NOTIMP and REFUSED. See the comment of res_nsend() |
| 680 | // in system\netd\resolv\res_query.cpp for more detail. |
| 681 | } testConfigs[]{ |
| 682 | // clang-format off |
| 683 | {ns_rcode::ns_r_formerr, EAI_FAIL}, |
| 684 | {ns_rcode::ns_r_servfail, EAI_AGAIN}, // Not mapped by rcode. |
| 685 | {ns_rcode::ns_r_nxdomain, EAI_NODATA}, |
| 686 | {ns_rcode::ns_r_notimpl, EAI_AGAIN}, // Not mapped by rcode. |
| 687 | {ns_rcode::ns_r_refused, EAI_AGAIN}, // Not mapped by rcode. |
| 688 | // clang-format on |
| 689 | }; |
| 690 | |
| 691 | for (const auto& config : testConfigs) { |
| 692 | SCOPED_TRACE(StringPrintf("rcode: %d", config.rcode)); |
| 693 | |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 694 | test::DNSResponder dns(config.rcode); |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 695 | dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.4"); |
| 696 | dns.setResponseProbability(0.0); // always ignore requests and response preset rcode |
| 697 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 698 | ASSERT_EQ(0, setResolvers()); |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 699 | |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 700 | hostent* hp = nullptr; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 701 | NetworkDnsEventReported event; |
| 702 | int rv = android_gethostbynamefornetcontext(host_name, AF_INET, &mNetcontext, &hp, &event); |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 703 | EXPECT_EQ(nullptr, hp); |
Bernie Innocenti | 7916c6a | 2019-04-25 15:16:51 +0900 | [diff] [blame] | 704 | EXPECT_EQ(config.expected_eai_error, rv); |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 705 | } |
| 706 | } |
| 707 | |
| 708 | // TODO: Add private DNS server timeout test. |
| 709 | TEST_F(GetHostByNameForNetContextTest, ServerTimeout) { |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 710 | constexpr char host_name[] = "hello.example.com."; |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 711 | test::DNSResponder dns(static_cast<ns_rcode>(-1) /*no response*/); |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 712 | dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.4"); |
| 713 | dns.setResponseProbability(0.0); // always ignore requests and don't response |
| 714 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 715 | ASSERT_EQ(0, setResolvers()); |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 716 | |
Luke Huang | d8ac475 | 2019-06-18 17:05:47 +0800 | [diff] [blame] | 717 | hostent* hp = nullptr; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 718 | NetworkDnsEventReported event; |
| 719 | int rv = android_gethostbynamefornetcontext(host_name, AF_INET, &mNetcontext, &hp, &event); |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 720 | EXPECT_EQ(NETD_RESOLV_TIMEOUT, rv); |
| 721 | } |
| 722 | |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 723 | TEST_F(GetHostByNameForNetContextTest, CnamesNoIpAddress) { |
| 724 | constexpr char ACNAME[] = "acname"; // expect a cname in answer |
| 725 | constexpr char CNAMES[] = "cnames"; // expect cname chain in answer |
| 726 | |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 727 | test::DNSResponder dns; |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 728 | dns.addMapping("cnames.example.com.", ns_type::ns_t_cname, "acname.example.com."); |
| 729 | dns.addMapping("acname.example.com.", ns_type::ns_t_cname, "hello.example.com."); |
| 730 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 731 | ASSERT_EQ(0, setResolvers()); |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 732 | |
| 733 | static const struct TestConfig { |
| 734 | const char* name; |
| 735 | int family; |
| 736 | } testConfigs[]{ |
| 737 | {ACNAME, AF_INET}, |
| 738 | {ACNAME, AF_INET6}, |
| 739 | {CNAMES, AF_INET}, |
| 740 | {CNAMES, AF_INET6}, |
| 741 | }; |
| 742 | |
| 743 | for (const auto& config : testConfigs) { |
| 744 | SCOPED_TRACE( |
| 745 | StringPrintf("config.family: %d, config.name: %s", config.family, config.name)); |
| 746 | |
| 747 | struct hostent* hp = nullptr; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 748 | NetworkDnsEventReported event; |
| 749 | int rv = android_gethostbynamefornetcontext(config.name, config.family, &mNetcontext, &hp, |
| 750 | &event); |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 751 | EXPECT_EQ(nullptr, hp); |
| 752 | EXPECT_EQ(EAI_FAIL, rv); |
| 753 | } |
| 754 | } |
| 755 | |
| 756 | TEST_F(GetHostByNameForNetContextTest, CnamesBrokenChainByIllegalCname) { |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 757 | test::DNSResponder dns; |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 758 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 759 | ASSERT_EQ(0, setResolvers()); |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 760 | |
| 761 | static const struct TestConfig { |
| 762 | const char* name; |
| 763 | const char* cname; |
| 764 | std::string asHostName() const { return StringPrintf("%s.example.com.", name); } |
| 765 | |
| 766 | // Illegal cname is verified by res_hnok() in system/netd/resolv/res_comp.cpp |
| 767 | } testConfigs[]{ |
| 768 | // clang-format off |
| 769 | {NAME(kBadCharAfterPeriodHost), kBadCharAfterPeriodHost}, |
| 770 | {NAME(kBadCharBeforePeriodHost), kBadCharBeforePeriodHost}, |
| 771 | {NAME(kBadCharAtTheEndHost), kBadCharAtTheEndHost}, |
| 772 | {NAME(kBadCharInTheMiddleOfLabelHost), kBadCharInTheMiddleOfLabelHost}, |
| 773 | // clang-format on |
| 774 | }; |
| 775 | |
| 776 | for (const auto& config : testConfigs) { |
| 777 | const std::string testHostName = config.asHostName(); |
| 778 | |
| 779 | // Expect to get no address because the cname chain is broken by an illegal cname format. |
| 780 | // |
| 781 | // Ex: |
| 782 | // ANSWER SECTION: |
| 783 | // hello.example.com. IN CNAME a.ex^ample.com. |
| 784 | // a.ex^ample.com. IN A 1.2.3.3 |
| 785 | // a.ex^ample.com. IN AAAA 2001:db8::42 |
| 786 | // |
| 787 | // In this example, querying hello.example.com should get no address because |
| 788 | // "a.ex^ample.com" has an illegal char '^' in the middle of label. |
| 789 | dns.addMapping(testHostName.c_str(), ns_type::ns_t_cname, config.cname); |
| 790 | dns.addMapping(config.cname, ns_type::ns_t_a, "1.2.3.3"); |
| 791 | dns.addMapping(config.cname, ns_type::ns_t_aaaa, "2001:db8::42"); |
| 792 | |
| 793 | for (const auto& family : {AF_INET, AF_INET6}) { |
| 794 | SCOPED_TRACE( |
| 795 | StringPrintf("family: %d, testHostName: %s", family, testHostName.c_str())); |
| 796 | |
| 797 | struct hostent* hp = nullptr; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 798 | NetworkDnsEventReported event; |
| 799 | int rv = android_gethostbynamefornetcontext(config.name, family, &mNetcontext, &hp, |
| 800 | &event); |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 801 | EXPECT_EQ(nullptr, hp); |
| 802 | EXPECT_EQ(EAI_FAIL, rv); |
| 803 | } |
| 804 | } |
| 805 | } |
| 806 | |
| 807 | TEST_F(GetHostByNameForNetContextTest, CnamesInfiniteLoop) { |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 808 | test::DNSResponder dns; |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 809 | dns.addMapping("hello.example.com.", ns_type::ns_t_cname, "a.example.com."); |
| 810 | dns.addMapping("a.example.com.", ns_type::ns_t_cname, "hello.example.com."); |
| 811 | ASSERT_TRUE(dns.startServer()); |
Mike Yu | c7649d1 | 2019-05-22 15:28:07 +0800 | [diff] [blame] | 812 | ASSERT_EQ(0, setResolvers()); |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 813 | |
| 814 | for (const auto& family : {AF_INET, AF_INET6}) { |
| 815 | SCOPED_TRACE(StringPrintf("family: %d", family)); |
| 816 | |
| 817 | struct hostent* hp = nullptr; |
lifr | 9498178 | 2019-05-17 21:15:19 +0800 | [diff] [blame] | 818 | NetworkDnsEventReported event; |
| 819 | int rv = android_gethostbynamefornetcontext("hello", family, &mNetcontext, &hp, &event); |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 820 | EXPECT_EQ(nullptr, hp); |
| 821 | EXPECT_EQ(EAI_FAIL, rv); |
| 822 | } |
| 823 | } |
| 824 | |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 825 | // Note that local host file function, files_getaddrinfo(), of resolv_getaddrinfo() |
Hungming Chen | 947aab0 | 2018-12-27 18:33:19 +0800 | [diff] [blame] | 826 | // is not tested because it only returns a boolean (success or failure) without any error number. |
| 827 | |
Luke Huang | 2dac438 | 2019-06-24 13:28:44 +0800 | [diff] [blame] | 828 | // TODO: Simplify the DNS server configuration, DNSResponder and resolv_set_nameservers, as |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 829 | // ResolverTest does. |
Luke Huang | 69e6718 | 2019-06-17 17:06:41 +0800 | [diff] [blame] | 830 | // TODO: Add test for resolv_getaddrinfo(). |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 831 | // - DNS response message parsing. |
| 832 | // - Unexpected type of resource record (RR). |
| 833 | // - Invalid length CNAME, or QNAME. |
| 834 | // - Unexpected amount of questions. |
| 835 | // - CNAME RDATA with the domain name which has null label(s). |
| 836 | // TODO: Add test for android_gethostbynamefornetcontext(). |
| 837 | // - Invalid parameters. |
Hungming Chen | b0cd3dc | 2019-05-24 16:18:07 +0800 | [diff] [blame] | 838 | // - DNS response message parsing. |
| 839 | // - Unexpected type of resource record (RR). |
| 840 | // - Invalid length CNAME, or QNAME. |
| 841 | // - Unexpected amount of questions. |
| 842 | // - CNAME RDATA with the domain name which has null label(s). |
Hungming Chen | 70161e5 | 2019-05-22 16:33:31 +0800 | [diff] [blame] | 843 | // TODO: Add test for android_gethostbyaddrfornetcontext(). |
nuccachen | 0efcc80 | 2018-11-28 18:19:39 +0800 | [diff] [blame] | 844 | |
| 845 | } // end of namespace net |
| 846 | } // end of namespace android |