Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2016 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | * |
| 16 | * FirewallControllerTest.cpp - unit tests for FirewallController.cpp |
| 17 | */ |
| 18 | |
| 19 | #include <string> |
| 20 | #include <vector> |
| 21 | #include <stdio.h> |
| 22 | |
| 23 | #include <gtest/gtest.h> |
| 24 | |
Hugo Benichi | 528d3d0 | 2018-06-20 13:35:58 +0900 | [diff] [blame^] | 25 | #include <android-base/file.h> |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 26 | #include <android-base/stringprintf.h> |
Hugo Benichi | 528d3d0 | 2018-06-20 13:35:58 +0900 | [diff] [blame^] | 27 | #include <android-base/strings.h> |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 28 | |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 29 | #include "FirewallController.h" |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 30 | #include "IptablesBaseTest.h" |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 31 | |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 32 | using android::base::Join; |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 33 | using android::base::StringPrintf; |
Hugo Benichi | 528d3d0 | 2018-06-20 13:35:58 +0900 | [diff] [blame^] | 34 | using android::base::WriteStringToFile; |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 35 | |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 36 | class FirewallControllerTest : public IptablesBaseTest { |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 37 | protected: |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 38 | FirewallControllerTest() { |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 39 | FirewallController::execIptablesRestore = fakeExecIptablesRestore; |
Chenbo Feng | 89c12f1 | 2018-03-21 10:29:18 -0700 | [diff] [blame] | 40 | mFw.mUseBpfOwnerMatch = false; |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 41 | } |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 42 | FirewallController mFw; |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 43 | |
Lorenzo Colitti | f157caf | 2016-05-13 11:25:54 +0900 | [diff] [blame] | 44 | std::string makeUidRules(IptablesTarget a, const char* b, bool c, |
| 45 | const std::vector<int32_t>& d) { |
| 46 | return mFw.makeUidRules(a, b, c, d); |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 47 | } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 48 | |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 49 | int createChain(const char* a, FirewallType b) { |
| 50 | return mFw.createChain(a, b); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 51 | } |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 52 | }; |
| 53 | |
| 54 | |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 55 | TEST_F(FirewallControllerTest, TestCreateWhitelistChain) { |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 56 | std::vector<std::string> expectedRestore4 = { |
| 57 | "*filter", |
| 58 | ":fw_whitelist -", |
Lorenzo Colitti | 8bcb1f4 | 2017-04-25 00:17:48 +0900 | [diff] [blame] | 59 | "-A fw_whitelist -m owner --uid-owner 0-9999 -j RETURN", |
Benedict Wong | b2daefb | 2017-12-06 22:05:46 -0800 | [diff] [blame] | 60 | "-A fw_whitelist -m owner ! --uid-owner 0-4294967294 -j RETURN", |
| 61 | "-A fw_whitelist -p esp -j RETURN", |
Lorenzo Colitti | 50b198a | 2017-03-30 02:50:09 +0900 | [diff] [blame] | 62 | "-A fw_whitelist -i lo -j RETURN", |
| 63 | "-A fw_whitelist -o lo -j RETURN", |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 64 | "-A fw_whitelist -p tcp --tcp-flags RST RST -j RETURN", |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 65 | "-A fw_whitelist -j DROP", |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 66 | "COMMIT\n" |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 67 | }; |
| 68 | std::vector<std::string> expectedRestore6 = { |
| 69 | "*filter", |
| 70 | ":fw_whitelist -", |
Lorenzo Colitti | 8bcb1f4 | 2017-04-25 00:17:48 +0900 | [diff] [blame] | 71 | "-A fw_whitelist -m owner --uid-owner 0-9999 -j RETURN", |
Benedict Wong | b2daefb | 2017-12-06 22:05:46 -0800 | [diff] [blame] | 72 | "-A fw_whitelist -m owner ! --uid-owner 0-4294967294 -j RETURN", |
| 73 | "-A fw_whitelist -p esp -j RETURN", |
Lorenzo Colitti | 50b198a | 2017-03-30 02:50:09 +0900 | [diff] [blame] | 74 | "-A fw_whitelist -i lo -j RETURN", |
| 75 | "-A fw_whitelist -o lo -j RETURN", |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 76 | "-A fw_whitelist -p tcp --tcp-flags RST RST -j RETURN", |
| 77 | "-A fw_whitelist -p icmpv6 --icmpv6-type packet-too-big -j RETURN", |
| 78 | "-A fw_whitelist -p icmpv6 --icmpv6-type router-solicitation -j RETURN", |
| 79 | "-A fw_whitelist -p icmpv6 --icmpv6-type router-advertisement -j RETURN", |
| 80 | "-A fw_whitelist -p icmpv6 --icmpv6-type neighbour-solicitation -j RETURN", |
| 81 | "-A fw_whitelist -p icmpv6 --icmpv6-type neighbour-advertisement -j RETURN", |
| 82 | "-A fw_whitelist -p icmpv6 --icmpv6-type redirect -j RETURN", |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 83 | "-A fw_whitelist -j DROP", |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 84 | "COMMIT\n" |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 85 | }; |
| 86 | std::vector<std::pair<IptablesTarget, std::string>> expectedRestoreCommands = { |
| 87 | { V4, android::base::Join(expectedRestore4, '\n') }, |
| 88 | { V6, android::base::Join(expectedRestore6, '\n') }, |
| 89 | }; |
| 90 | |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 91 | createChain("fw_whitelist", WHITELIST); |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 92 | expectIptablesRestoreCommands(expectedRestoreCommands); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 93 | } |
| 94 | |
| 95 | TEST_F(FirewallControllerTest, TestCreateBlacklistChain) { |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 96 | std::vector<std::string> expectedRestore = { |
| 97 | "*filter", |
| 98 | ":fw_blacklist -", |
Lorenzo Colitti | 50b198a | 2017-03-30 02:50:09 +0900 | [diff] [blame] | 99 | "-A fw_blacklist -i lo -j RETURN", |
| 100 | "-A fw_blacklist -o lo -j RETURN", |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 101 | "-A fw_blacklist -p tcp --tcp-flags RST RST -j RETURN", |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 102 | "COMMIT\n" |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 103 | }; |
| 104 | std::vector<std::pair<IptablesTarget, std::string>> expectedRestoreCommands = { |
| 105 | { V4, android::base::Join(expectedRestore, '\n') }, |
| 106 | { V6, android::base::Join(expectedRestore, '\n') }, |
| 107 | }; |
| 108 | |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 109 | createChain("fw_blacklist", BLACKLIST); |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 110 | expectIptablesRestoreCommands(expectedRestoreCommands); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 111 | } |
| 112 | |
| 113 | TEST_F(FirewallControllerTest, TestSetStandbyRule) { |
| 114 | ExpectedIptablesCommands expected = { |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 115 | { V4V6, "*filter\n-D fw_standby -m owner --uid-owner 12345 -j DROP\nCOMMIT\n" } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 116 | }; |
| 117 | mFw.setUidRule(STANDBY, 12345, ALLOW); |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 118 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 119 | |
| 120 | expected = { |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 121 | { V4V6, "*filter\n-A fw_standby -m owner --uid-owner 12345 -j DROP\nCOMMIT\n" } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 122 | }; |
| 123 | mFw.setUidRule(STANDBY, 12345, DENY); |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 124 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 125 | } |
| 126 | |
| 127 | TEST_F(FirewallControllerTest, TestSetDozeRule) { |
| 128 | ExpectedIptablesCommands expected = { |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 129 | { V4V6, "*filter\n-I fw_dozable -m owner --uid-owner 54321 -j RETURN\nCOMMIT\n" } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 130 | }; |
| 131 | mFw.setUidRule(DOZABLE, 54321, ALLOW); |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 132 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 133 | |
| 134 | expected = { |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 135 | { V4V6, "*filter\n-D fw_dozable -m owner --uid-owner 54321 -j RETURN\nCOMMIT\n" } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 136 | }; |
| 137 | mFw.setUidRule(DOZABLE, 54321, DENY); |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 138 | expectIptablesRestoreCommands(expected); |
| 139 | } |
| 140 | |
| 141 | TEST_F(FirewallControllerTest, TestSetFirewallRule) { |
| 142 | ExpectedIptablesCommands expected = { |
| 143 | { V4V6, "*filter\n" |
| 144 | "-A fw_INPUT -m owner --uid-owner 54321 -j DROP\n" |
| 145 | "-A fw_OUTPUT -m owner --uid-owner 54321 -j DROP\n" |
| 146 | "COMMIT\n" } |
| 147 | }; |
| 148 | mFw.setUidRule(NONE, 54321, DENY); |
| 149 | expectIptablesRestoreCommands(expected); |
| 150 | |
| 151 | expected = { |
| 152 | { V4V6, "*filter\n" |
| 153 | "-D fw_INPUT -m owner --uid-owner 54321 -j DROP\n" |
| 154 | "-D fw_OUTPUT -m owner --uid-owner 54321 -j DROP\n" |
| 155 | "COMMIT\n" } |
| 156 | }; |
| 157 | mFw.setUidRule(NONE, 54321, ALLOW); |
| 158 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 159 | } |
| 160 | |
| 161 | TEST_F(FirewallControllerTest, TestReplaceWhitelistUidRule) { |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 162 | std::string expected = |
| 163 | "*filter\n" |
| 164 | ":FW_whitechain -\n" |
Lorenzo Colitti | 8bcb1f4 | 2017-04-25 00:17:48 +0900 | [diff] [blame] | 165 | "-A FW_whitechain -m owner --uid-owner 10023 -j RETURN\n" |
| 166 | "-A FW_whitechain -m owner --uid-owner 10059 -j RETURN\n" |
| 167 | "-A FW_whitechain -m owner --uid-owner 10124 -j RETURN\n" |
| 168 | "-A FW_whitechain -m owner --uid-owner 10111 -j RETURN\n" |
| 169 | "-A FW_whitechain -m owner --uid-owner 110122 -j RETURN\n" |
| 170 | "-A FW_whitechain -m owner --uid-owner 210153 -j RETURN\n" |
| 171 | "-A FW_whitechain -m owner --uid-owner 210024 -j RETURN\n" |
| 172 | "-A FW_whitechain -m owner --uid-owner 0-9999 -j RETURN\n" |
Benedict Wong | b2daefb | 2017-12-06 22:05:46 -0800 | [diff] [blame] | 173 | "-A FW_whitechain -m owner ! --uid-owner 0-4294967294 -j RETURN\n" |
| 174 | "-A FW_whitechain -p esp -j RETURN\n" |
Lorenzo Colitti | 50b198a | 2017-03-30 02:50:09 +0900 | [diff] [blame] | 175 | "-A FW_whitechain -i lo -j RETURN\n" |
| 176 | "-A FW_whitechain -o lo -j RETURN\n" |
Lorenzo Colitti | f157caf | 2016-05-13 11:25:54 +0900 | [diff] [blame] | 177 | "-A FW_whitechain -p tcp --tcp-flags RST RST -j RETURN\n" |
| 178 | "-A FW_whitechain -p icmpv6 --icmpv6-type packet-too-big -j RETURN\n" |
| 179 | "-A FW_whitechain -p icmpv6 --icmpv6-type router-solicitation -j RETURN\n" |
| 180 | "-A FW_whitechain -p icmpv6 --icmpv6-type router-advertisement -j RETURN\n" |
| 181 | "-A FW_whitechain -p icmpv6 --icmpv6-type neighbour-solicitation -j RETURN\n" |
| 182 | "-A FW_whitechain -p icmpv6 --icmpv6-type neighbour-advertisement -j RETURN\n" |
| 183 | "-A FW_whitechain -p icmpv6 --icmpv6-type redirect -j RETURN\n" |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 184 | "-A FW_whitechain -j DROP\n" |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 185 | "COMMIT\n"; |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 186 | |
| 187 | std::vector<int32_t> uids = { 10023, 10059, 10124, 10111, 110122, 210153, 210024 }; |
Lorenzo Colitti | f157caf | 2016-05-13 11:25:54 +0900 | [diff] [blame] | 188 | EXPECT_EQ(expected, makeUidRules(V6, "FW_whitechain", true, uids)); |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 189 | } |
| 190 | |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 191 | TEST_F(FirewallControllerTest, TestReplaceBlacklistUidRule) { |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 192 | std::string expected = |
| 193 | "*filter\n" |
| 194 | ":FW_blackchain -\n" |
Lorenzo Colitti | 50b198a | 2017-03-30 02:50:09 +0900 | [diff] [blame] | 195 | "-A FW_blackchain -i lo -j RETURN\n" |
| 196 | "-A FW_blackchain -o lo -j RETURN\n" |
Lorenzo Colitti | f157caf | 2016-05-13 11:25:54 +0900 | [diff] [blame] | 197 | "-A FW_blackchain -p tcp --tcp-flags RST RST -j RETURN\n" |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 198 | "-A FW_blackchain -m owner --uid-owner 10023 -j DROP\n" |
| 199 | "-A FW_blackchain -m owner --uid-owner 10059 -j DROP\n" |
| 200 | "-A FW_blackchain -m owner --uid-owner 10124 -j DROP\n" |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 201 | "COMMIT\n"; |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 202 | |
| 203 | std::vector<int32_t> uids = { 10023, 10059, 10124 }; |
Lorenzo Colitti | f157caf | 2016-05-13 11:25:54 +0900 | [diff] [blame] | 204 | EXPECT_EQ(expected, makeUidRules(V4 ,"FW_blackchain", false, uids)); |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 205 | } |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 206 | |
| 207 | TEST_F(FirewallControllerTest, TestEnableChildChains) { |
| 208 | std::vector<std::string> expected = { |
Lorenzo Colitti | a161196 | 2017-04-26 16:30:39 +0900 | [diff] [blame] | 209 | "*filter\n" |
| 210 | "-A fw_INPUT -j fw_dozable\n" |
| 211 | "-A fw_OUTPUT -j fw_dozable\n" |
| 212 | "COMMIT\n" |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 213 | }; |
| 214 | EXPECT_EQ(0, mFw.enableChildChains(DOZABLE, true)); |
Lorenzo Colitti | a161196 | 2017-04-26 16:30:39 +0900 | [diff] [blame] | 215 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 216 | |
| 217 | expected = { |
Lorenzo Colitti | a161196 | 2017-04-26 16:30:39 +0900 | [diff] [blame] | 218 | "*filter\n" |
| 219 | "-D fw_INPUT -j fw_powersave\n" |
| 220 | "-D fw_OUTPUT -j fw_powersave\n" |
| 221 | "COMMIT\n" |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 222 | }; |
| 223 | EXPECT_EQ(0, mFw.enableChildChains(POWERSAVE, false)); |
Lorenzo Colitti | a161196 | 2017-04-26 16:30:39 +0900 | [diff] [blame] | 224 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 225 | } |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 226 | |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 227 | TEST_F(FirewallControllerTest, TestFirewall) { |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 228 | std::vector<std::string> enableCommands = { |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 229 | "*filter\n" |
| 230 | "-A fw_INPUT -j DROP\n" |
| 231 | "-A fw_OUTPUT -j REJECT\n" |
| 232 | "-A fw_FORWARD -j REJECT\n" |
| 233 | "COMMIT\n" |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 234 | }; |
| 235 | std::vector<std::string> disableCommands = { |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 236 | "*filter\n" |
| 237 | ":fw_INPUT -\n" |
| 238 | ":fw_OUTPUT -\n" |
| 239 | ":fw_FORWARD -\n" |
| 240 | "COMMIT\n" |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 241 | }; |
| 242 | std::vector<std::string> noCommands = {}; |
| 243 | |
| 244 | EXPECT_EQ(0, mFw.disableFirewall()); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 245 | expectIptablesRestoreCommands(disableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 246 | |
| 247 | EXPECT_EQ(0, mFw.disableFirewall()); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 248 | expectIptablesRestoreCommands(disableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 249 | |
| 250 | EXPECT_EQ(0, mFw.enableFirewall(BLACKLIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 251 | expectIptablesRestoreCommands(disableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 252 | |
| 253 | EXPECT_EQ(0, mFw.enableFirewall(BLACKLIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 254 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 255 | |
| 256 | std::vector<std::string> disableEnableCommands; |
| 257 | disableEnableCommands.insert( |
| 258 | disableEnableCommands.end(), disableCommands.begin(), disableCommands.end()); |
| 259 | disableEnableCommands.insert( |
| 260 | disableEnableCommands.end(), enableCommands.begin(), enableCommands.end()); |
| 261 | |
| 262 | EXPECT_EQ(0, mFw.enableFirewall(WHITELIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 263 | expectIptablesRestoreCommands(disableEnableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 264 | |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 265 | std::vector<std::string> ifaceCommands = { |
Lorenzo Colitti | 1411d45 | 2017-07-17 22:12:15 +0900 | [diff] [blame] | 266 | "*filter\n" |
| 267 | "-I fw_INPUT -i rmnet_data0 -j RETURN\n" |
| 268 | "-I fw_OUTPUT -o rmnet_data0 -j RETURN\n" |
| 269 | "COMMIT\n" |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 270 | }; |
| 271 | EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); |
Lorenzo Colitti | 1411d45 | 2017-07-17 22:12:15 +0900 | [diff] [blame] | 272 | expectIptablesRestoreCommands(ifaceCommands); |
| 273 | |
| 274 | EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); |
| 275 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 276 | |
| 277 | ifaceCommands = { |
Lorenzo Colitti | 1411d45 | 2017-07-17 22:12:15 +0900 | [diff] [blame] | 278 | "*filter\n" |
| 279 | "-D fw_INPUT -i rmnet_data0 -j RETURN\n" |
| 280 | "-D fw_OUTPUT -o rmnet_data0 -j RETURN\n" |
| 281 | "COMMIT\n" |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 282 | }; |
| 283 | EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", DENY)); |
Lorenzo Colitti | 1411d45 | 2017-07-17 22:12:15 +0900 | [diff] [blame] | 284 | expectIptablesRestoreCommands(ifaceCommands); |
| 285 | |
| 286 | EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", DENY)); |
| 287 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 288 | |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 289 | EXPECT_EQ(0, mFw.enableFirewall(WHITELIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 290 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 291 | |
| 292 | EXPECT_EQ(0, mFw.disableFirewall()); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 293 | expectIptablesRestoreCommands(disableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 294 | |
| 295 | // TODO: calling disableFirewall and then enableFirewall(WHITELIST) does |
| 296 | // nothing. This seems like a clear bug. |
| 297 | EXPECT_EQ(0, mFw.enableFirewall(WHITELIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 298 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 299 | } |
Hugo Benichi | 528d3d0 | 2018-06-20 13:35:58 +0900 | [diff] [blame^] | 300 | |
| 301 | TEST_F(FirewallControllerTest, TestDiscoverMaximumValidUid) { |
| 302 | struct { |
| 303 | const std::string description; |
| 304 | const std::string content; |
| 305 | const uint32_t expected; |
| 306 | } testCases[] = { |
| 307 | { |
| 308 | .description = "root namespace case", |
| 309 | .content = " 0 0 4294967295", |
| 310 | .expected = 4294967294, |
| 311 | }, |
| 312 | { |
| 313 | .description = "container namespace case", |
| 314 | .content = " 0 655360 5000\n" |
| 315 | " 5000 600 50\n" |
| 316 | " 5050 660410 1994950\n", |
| 317 | .expected = 1999999, |
| 318 | }, |
| 319 | { |
| 320 | .description = "garbage content case", |
| 321 | .content = "garbage", |
| 322 | .expected = 4294967294, |
| 323 | }, |
| 324 | { |
| 325 | .description = "no content case", |
| 326 | .content = "", |
| 327 | .expected = 4294967294, |
| 328 | }, |
| 329 | }; |
| 330 | |
| 331 | const std::string tempFile = "/data/local/tmp/fake_uid_mapping"; |
| 332 | |
| 333 | for (const auto& test : testCases) { |
| 334 | EXPECT_TRUE(WriteStringToFile(test.content, tempFile, false)); |
| 335 | uint32_t got = FirewallController::discoverMaximumValidUid(tempFile); |
| 336 | EXPECT_EQ(0, remove(tempFile.c_str())); |
| 337 | if (got != test.expected) { |
| 338 | FAIL() << test.description << ":\n" |
| 339 | << test.content << "\ngot " << got << ", but expected " << test.expected; |
| 340 | } |
| 341 | } |
| 342 | |
| 343 | // Also check when the file is not defined |
| 344 | EXPECT_NE(0, access(tempFile.c_str(), F_OK)); |
| 345 | EXPECT_EQ(4294967294, FirewallController::discoverMaximumValidUid(tempFile)); |
| 346 | } |