blob: 952b21e8424b205494067ef31a456b7c83a67e31 [file] [log] [blame]
Lorenzo Colitti89faa342016-02-26 11:38:47 +09001/*
2 * Copyright 2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 *
16 * FirewallControllerTest.cpp - unit tests for FirewallController.cpp
17 */
18
19#include <string>
20#include <vector>
21#include <stdio.h>
22
23#include <gtest/gtest.h>
24
Lorenzo Colittia55388e2016-05-13 17:03:42 +090025#include <android-base/strings.h>
Lorenzo Colitti6324b182017-07-17 21:48:14 +090026#include <android-base/stringprintf.h>
Lorenzo Colittia55388e2016-05-13 17:03:42 +090027
Lorenzo Colitti89faa342016-02-26 11:38:47 +090028#include "FirewallController.h"
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090029#include "IptablesBaseTest.h"
Lorenzo Colitti89faa342016-02-26 11:38:47 +090030
Lorenzo Colittid351bea2017-07-16 22:52:30 +090031using android::base::Join;
Lorenzo Colitti6324b182017-07-17 21:48:14 +090032using android::base::StringPrintf;
Lorenzo Colitti89faa342016-02-26 11:38:47 +090033
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090034class FirewallControllerTest : public IptablesBaseTest {
Lorenzo Colitti89faa342016-02-26 11:38:47 +090035protected:
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090036 FirewallControllerTest() {
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090037 FirewallController::execIptablesRestore = fakeExecIptablesRestore;
Chenbo Feng89c12f12018-03-21 10:29:18 -070038 mFw.mUseBpfOwnerMatch = false;
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090039 }
Lorenzo Colitti89faa342016-02-26 11:38:47 +090040 FirewallController mFw;
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090041
Lorenzo Colittif157caf2016-05-13 11:25:54 +090042 std::string makeUidRules(IptablesTarget a, const char* b, bool c,
43 const std::vector<int32_t>& d) {
44 return mFw.makeUidRules(a, b, c, d);
Lorenzo Colitti89faa342016-02-26 11:38:47 +090045 }
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090046
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +090047 int createChain(const char* a, FirewallType b) {
48 return mFw.createChain(a, b);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090049 }
Lorenzo Colitti89faa342016-02-26 11:38:47 +090050};
51
52
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090053TEST_F(FirewallControllerTest, TestCreateWhitelistChain) {
Lorenzo Colittia55388e2016-05-13 17:03:42 +090054 std::vector<std::string> expectedRestore4 = {
55 "*filter",
56 ":fw_whitelist -",
Lorenzo Colitti8bcb1f42017-04-25 00:17:48 +090057 "-A fw_whitelist -m owner --uid-owner 0-9999 -j RETURN",
Benedict Wongb2daefb2017-12-06 22:05:46 -080058 "-A fw_whitelist -m owner ! --uid-owner 0-4294967294 -j RETURN",
59 "-A fw_whitelist -p esp -j RETURN",
Lorenzo Colitti50b198a2017-03-30 02:50:09 +090060 "-A fw_whitelist -i lo -j RETURN",
61 "-A fw_whitelist -o lo -j RETURN",
Lorenzo Colittia55388e2016-05-13 17:03:42 +090062 "-A fw_whitelist -p tcp --tcp-flags RST RST -j RETURN",
Lorenzo Colittia55388e2016-05-13 17:03:42 +090063 "-A fw_whitelist -j DROP",
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +090064 "COMMIT\n"
Lorenzo Colittia55388e2016-05-13 17:03:42 +090065 };
66 std::vector<std::string> expectedRestore6 = {
67 "*filter",
68 ":fw_whitelist -",
Lorenzo Colitti8bcb1f42017-04-25 00:17:48 +090069 "-A fw_whitelist -m owner --uid-owner 0-9999 -j RETURN",
Benedict Wongb2daefb2017-12-06 22:05:46 -080070 "-A fw_whitelist -m owner ! --uid-owner 0-4294967294 -j RETURN",
71 "-A fw_whitelist -p esp -j RETURN",
Lorenzo Colitti50b198a2017-03-30 02:50:09 +090072 "-A fw_whitelist -i lo -j RETURN",
73 "-A fw_whitelist -o lo -j RETURN",
Lorenzo Colittia55388e2016-05-13 17:03:42 +090074 "-A fw_whitelist -p tcp --tcp-flags RST RST -j RETURN",
75 "-A fw_whitelist -p icmpv6 --icmpv6-type packet-too-big -j RETURN",
76 "-A fw_whitelist -p icmpv6 --icmpv6-type router-solicitation -j RETURN",
77 "-A fw_whitelist -p icmpv6 --icmpv6-type router-advertisement -j RETURN",
78 "-A fw_whitelist -p icmpv6 --icmpv6-type neighbour-solicitation -j RETURN",
79 "-A fw_whitelist -p icmpv6 --icmpv6-type neighbour-advertisement -j RETURN",
80 "-A fw_whitelist -p icmpv6 --icmpv6-type redirect -j RETURN",
Lorenzo Colittia55388e2016-05-13 17:03:42 +090081 "-A fw_whitelist -j DROP",
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +090082 "COMMIT\n"
Lorenzo Colittia55388e2016-05-13 17:03:42 +090083 };
84 std::vector<std::pair<IptablesTarget, std::string>> expectedRestoreCommands = {
85 { V4, android::base::Join(expectedRestore4, '\n') },
86 { V6, android::base::Join(expectedRestore6, '\n') },
87 };
88
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +090089 createChain("fw_whitelist", WHITELIST);
Lorenzo Colittia55388e2016-05-13 17:03:42 +090090 expectIptablesRestoreCommands(expectedRestoreCommands);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090091}
92
93TEST_F(FirewallControllerTest, TestCreateBlacklistChain) {
Lorenzo Colittia55388e2016-05-13 17:03:42 +090094 std::vector<std::string> expectedRestore = {
95 "*filter",
96 ":fw_blacklist -",
Lorenzo Colitti50b198a2017-03-30 02:50:09 +090097 "-A fw_blacklist -i lo -j RETURN",
98 "-A fw_blacklist -o lo -j RETURN",
Lorenzo Colittia55388e2016-05-13 17:03:42 +090099 "-A fw_blacklist -p tcp --tcp-flags RST RST -j RETURN",
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +0900100 "COMMIT\n"
Lorenzo Colittia55388e2016-05-13 17:03:42 +0900101 };
102 std::vector<std::pair<IptablesTarget, std::string>> expectedRestoreCommands = {
103 { V4, android::base::Join(expectedRestore, '\n') },
104 { V6, android::base::Join(expectedRestore, '\n') },
105 };
106
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +0900107 createChain("fw_blacklist", BLACKLIST);
Lorenzo Colittia55388e2016-05-13 17:03:42 +0900108 expectIptablesRestoreCommands(expectedRestoreCommands);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900109}
110
111TEST_F(FirewallControllerTest, TestSetStandbyRule) {
112 ExpectedIptablesCommands expected = {
Lorenzo Colittia7357652017-04-25 00:16:36 +0900113 { V4V6, "*filter\n-D fw_standby -m owner --uid-owner 12345 -j DROP\nCOMMIT\n" }
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900114 };
115 mFw.setUidRule(STANDBY, 12345, ALLOW);
Lorenzo Colittia7357652017-04-25 00:16:36 +0900116 expectIptablesRestoreCommands(expected);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900117
118 expected = {
Lorenzo Colittia7357652017-04-25 00:16:36 +0900119 { V4V6, "*filter\n-A fw_standby -m owner --uid-owner 12345 -j DROP\nCOMMIT\n" }
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900120 };
121 mFw.setUidRule(STANDBY, 12345, DENY);
Lorenzo Colittia7357652017-04-25 00:16:36 +0900122 expectIptablesRestoreCommands(expected);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900123}
124
125TEST_F(FirewallControllerTest, TestSetDozeRule) {
126 ExpectedIptablesCommands expected = {
Lorenzo Colittia7357652017-04-25 00:16:36 +0900127 { V4V6, "*filter\n-I fw_dozable -m owner --uid-owner 54321 -j RETURN\nCOMMIT\n" }
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900128 };
129 mFw.setUidRule(DOZABLE, 54321, ALLOW);
Lorenzo Colittia7357652017-04-25 00:16:36 +0900130 expectIptablesRestoreCommands(expected);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900131
132 expected = {
Lorenzo Colittia7357652017-04-25 00:16:36 +0900133 { V4V6, "*filter\n-D fw_dozable -m owner --uid-owner 54321 -j RETURN\nCOMMIT\n" }
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900134 };
135 mFw.setUidRule(DOZABLE, 54321, DENY);
Lorenzo Colittia7357652017-04-25 00:16:36 +0900136 expectIptablesRestoreCommands(expected);
137}
138
139TEST_F(FirewallControllerTest, TestSetFirewallRule) {
140 ExpectedIptablesCommands expected = {
141 { V4V6, "*filter\n"
142 "-A fw_INPUT -m owner --uid-owner 54321 -j DROP\n"
143 "-A fw_OUTPUT -m owner --uid-owner 54321 -j DROP\n"
144 "COMMIT\n" }
145 };
146 mFw.setUidRule(NONE, 54321, DENY);
147 expectIptablesRestoreCommands(expected);
148
149 expected = {
150 { V4V6, "*filter\n"
151 "-D fw_INPUT -m owner --uid-owner 54321 -j DROP\n"
152 "-D fw_OUTPUT -m owner --uid-owner 54321 -j DROP\n"
153 "COMMIT\n" }
154 };
155 mFw.setUidRule(NONE, 54321, ALLOW);
156 expectIptablesRestoreCommands(expected);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900157}
158
159TEST_F(FirewallControllerTest, TestReplaceWhitelistUidRule) {
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900160 std::string expected =
161 "*filter\n"
162 ":FW_whitechain -\n"
Lorenzo Colitti8bcb1f42017-04-25 00:17:48 +0900163 "-A FW_whitechain -m owner --uid-owner 10023 -j RETURN\n"
164 "-A FW_whitechain -m owner --uid-owner 10059 -j RETURN\n"
165 "-A FW_whitechain -m owner --uid-owner 10124 -j RETURN\n"
166 "-A FW_whitechain -m owner --uid-owner 10111 -j RETURN\n"
167 "-A FW_whitechain -m owner --uid-owner 110122 -j RETURN\n"
168 "-A FW_whitechain -m owner --uid-owner 210153 -j RETURN\n"
169 "-A FW_whitechain -m owner --uid-owner 210024 -j RETURN\n"
170 "-A FW_whitechain -m owner --uid-owner 0-9999 -j RETURN\n"
Benedict Wongb2daefb2017-12-06 22:05:46 -0800171 "-A FW_whitechain -m owner ! --uid-owner 0-4294967294 -j RETURN\n"
172 "-A FW_whitechain -p esp -j RETURN\n"
Lorenzo Colitti50b198a2017-03-30 02:50:09 +0900173 "-A FW_whitechain -i lo -j RETURN\n"
174 "-A FW_whitechain -o lo -j RETURN\n"
Lorenzo Colittif157caf2016-05-13 11:25:54 +0900175 "-A FW_whitechain -p tcp --tcp-flags RST RST -j RETURN\n"
176 "-A FW_whitechain -p icmpv6 --icmpv6-type packet-too-big -j RETURN\n"
177 "-A FW_whitechain -p icmpv6 --icmpv6-type router-solicitation -j RETURN\n"
178 "-A FW_whitechain -p icmpv6 --icmpv6-type router-advertisement -j RETURN\n"
179 "-A FW_whitechain -p icmpv6 --icmpv6-type neighbour-solicitation -j RETURN\n"
180 "-A FW_whitechain -p icmpv6 --icmpv6-type neighbour-advertisement -j RETURN\n"
181 "-A FW_whitechain -p icmpv6 --icmpv6-type redirect -j RETURN\n"
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900182 "-A FW_whitechain -j DROP\n"
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +0900183 "COMMIT\n";
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900184
185 std::vector<int32_t> uids = { 10023, 10059, 10124, 10111, 110122, 210153, 210024 };
Lorenzo Colittif157caf2016-05-13 11:25:54 +0900186 EXPECT_EQ(expected, makeUidRules(V6, "FW_whitechain", true, uids));
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900187}
188
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900189TEST_F(FirewallControllerTest, TestReplaceBlacklistUidRule) {
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900190 std::string expected =
191 "*filter\n"
192 ":FW_blackchain -\n"
Lorenzo Colitti50b198a2017-03-30 02:50:09 +0900193 "-A FW_blackchain -i lo -j RETURN\n"
194 "-A FW_blackchain -o lo -j RETURN\n"
Lorenzo Colittif157caf2016-05-13 11:25:54 +0900195 "-A FW_blackchain -p tcp --tcp-flags RST RST -j RETURN\n"
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900196 "-A FW_blackchain -m owner --uid-owner 10023 -j DROP\n"
197 "-A FW_blackchain -m owner --uid-owner 10059 -j DROP\n"
198 "-A FW_blackchain -m owner --uid-owner 10124 -j DROP\n"
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +0900199 "COMMIT\n";
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900200
201 std::vector<int32_t> uids = { 10023, 10059, 10124 };
Lorenzo Colittif157caf2016-05-13 11:25:54 +0900202 EXPECT_EQ(expected, makeUidRules(V4 ,"FW_blackchain", false, uids));
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900203}
Lorenzo Colittidd9a54b2017-04-26 16:13:22 +0900204
205TEST_F(FirewallControllerTest, TestEnableChildChains) {
206 std::vector<std::string> expected = {
Lorenzo Colittia1611962017-04-26 16:30:39 +0900207 "*filter\n"
208 "-A fw_INPUT -j fw_dozable\n"
209 "-A fw_OUTPUT -j fw_dozable\n"
210 "COMMIT\n"
Lorenzo Colittidd9a54b2017-04-26 16:13:22 +0900211 };
212 EXPECT_EQ(0, mFw.enableChildChains(DOZABLE, true));
Lorenzo Colittia1611962017-04-26 16:30:39 +0900213 expectIptablesRestoreCommands(expected);
Lorenzo Colittidd9a54b2017-04-26 16:13:22 +0900214
215 expected = {
Lorenzo Colittia1611962017-04-26 16:30:39 +0900216 "*filter\n"
217 "-D fw_INPUT -j fw_powersave\n"
218 "-D fw_OUTPUT -j fw_powersave\n"
219 "COMMIT\n"
Lorenzo Colittidd9a54b2017-04-26 16:13:22 +0900220 };
221 EXPECT_EQ(0, mFw.enableChildChains(POWERSAVE, false));
Lorenzo Colittia1611962017-04-26 16:30:39 +0900222 expectIptablesRestoreCommands(expected);
Lorenzo Colittidd9a54b2017-04-26 16:13:22 +0900223}
Lorenzo Colitticc1bb822017-07-16 21:08:54 +0900224
Lorenzo Colitti6324b182017-07-17 21:48:14 +0900225TEST_F(FirewallControllerTest, TestFirewall) {
Lorenzo Colitticc1bb822017-07-16 21:08:54 +0900226 std::vector<std::string> enableCommands = {
Lorenzo Colittid351bea2017-07-16 22:52:30 +0900227 "*filter\n"
228 "-A fw_INPUT -j DROP\n"
229 "-A fw_OUTPUT -j REJECT\n"
230 "-A fw_FORWARD -j REJECT\n"
231 "COMMIT\n"
Lorenzo Colitticc1bb822017-07-16 21:08:54 +0900232 };
233 std::vector<std::string> disableCommands = {
Lorenzo Colittid351bea2017-07-16 22:52:30 +0900234 "*filter\n"
235 ":fw_INPUT -\n"
236 ":fw_OUTPUT -\n"
237 ":fw_FORWARD -\n"
238 "COMMIT\n"
Lorenzo Colitticc1bb822017-07-16 21:08:54 +0900239 };
240 std::vector<std::string> noCommands = {};
241
242 EXPECT_EQ(0, mFw.disableFirewall());
Lorenzo Colittid351bea2017-07-16 22:52:30 +0900243 expectIptablesRestoreCommands(disableCommands);
Lorenzo Colitticc1bb822017-07-16 21:08:54 +0900244
245 EXPECT_EQ(0, mFw.disableFirewall());
Lorenzo Colittid351bea2017-07-16 22:52:30 +0900246 expectIptablesRestoreCommands(disableCommands);
Lorenzo Colitticc1bb822017-07-16 21:08:54 +0900247
248 EXPECT_EQ(0, mFw.enableFirewall(BLACKLIST));
Lorenzo Colittid351bea2017-07-16 22:52:30 +0900249 expectIptablesRestoreCommands(disableCommands);
Lorenzo Colitticc1bb822017-07-16 21:08:54 +0900250
251 EXPECT_EQ(0, mFw.enableFirewall(BLACKLIST));
Lorenzo Colittid351bea2017-07-16 22:52:30 +0900252 expectIptablesRestoreCommands(noCommands);
Lorenzo Colitticc1bb822017-07-16 21:08:54 +0900253
254 std::vector<std::string> disableEnableCommands;
255 disableEnableCommands.insert(
256 disableEnableCommands.end(), disableCommands.begin(), disableCommands.end());
257 disableEnableCommands.insert(
258 disableEnableCommands.end(), enableCommands.begin(), enableCommands.end());
259
260 EXPECT_EQ(0, mFw.enableFirewall(WHITELIST));
Lorenzo Colittid351bea2017-07-16 22:52:30 +0900261 expectIptablesRestoreCommands(disableEnableCommands);
Lorenzo Colitticc1bb822017-07-16 21:08:54 +0900262
Lorenzo Colitti6324b182017-07-17 21:48:14 +0900263 std::vector<std::string> ifaceCommands = {
Lorenzo Colitti1411d452017-07-17 22:12:15 +0900264 "*filter\n"
265 "-I fw_INPUT -i rmnet_data0 -j RETURN\n"
266 "-I fw_OUTPUT -o rmnet_data0 -j RETURN\n"
267 "COMMIT\n"
Lorenzo Colitti6324b182017-07-17 21:48:14 +0900268 };
269 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW));
Lorenzo Colitti1411d452017-07-17 22:12:15 +0900270 expectIptablesRestoreCommands(ifaceCommands);
271
272 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW));
273 expectIptablesRestoreCommands(noCommands);
Lorenzo Colitti6324b182017-07-17 21:48:14 +0900274
275 ifaceCommands = {
Lorenzo Colitti1411d452017-07-17 22:12:15 +0900276 "*filter\n"
277 "-D fw_INPUT -i rmnet_data0 -j RETURN\n"
278 "-D fw_OUTPUT -o rmnet_data0 -j RETURN\n"
279 "COMMIT\n"
Lorenzo Colitti6324b182017-07-17 21:48:14 +0900280 };
281 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", DENY));
Lorenzo Colitti1411d452017-07-17 22:12:15 +0900282 expectIptablesRestoreCommands(ifaceCommands);
283
284 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", DENY));
285 expectIptablesRestoreCommands(noCommands);
Lorenzo Colitti6324b182017-07-17 21:48:14 +0900286
Lorenzo Colitticc1bb822017-07-16 21:08:54 +0900287 EXPECT_EQ(0, mFw.enableFirewall(WHITELIST));
Lorenzo Colittid351bea2017-07-16 22:52:30 +0900288 expectIptablesRestoreCommands(noCommands);
Lorenzo Colitticc1bb822017-07-16 21:08:54 +0900289
290 EXPECT_EQ(0, mFw.disableFirewall());
Lorenzo Colittid351bea2017-07-16 22:52:30 +0900291 expectIptablesRestoreCommands(disableCommands);
Lorenzo Colitticc1bb822017-07-16 21:08:54 +0900292
293 // TODO: calling disableFirewall and then enableFirewall(WHITELIST) does
294 // nothing. This seems like a clear bug.
295 EXPECT_EQ(0, mFw.enableFirewall(WHITELIST));
Lorenzo Colittid351bea2017-07-16 22:52:30 +0900296 expectIptablesRestoreCommands(noCommands);
Lorenzo Colitticc1bb822017-07-16 21:08:54 +0900297}