blob: 7f6f0ae0e18a3ea8ed40e661e1fefc17ede53b19 [file] [log] [blame]
Lorenzo Colitti89faa342016-02-26 11:38:47 +09001/*
2 * Copyright 2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 *
16 * FirewallControllerTest.cpp - unit tests for FirewallController.cpp
17 */
18
19#include <string>
20#include <vector>
21#include <stdio.h>
22
23#include <gtest/gtest.h>
24
Lorenzo Colittia55388e2016-05-13 17:03:42 +090025#include <android-base/strings.h>
26
Lorenzo Colitti89faa342016-02-26 11:38:47 +090027#include "FirewallController.h"
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090028#include "IptablesBaseTest.h"
Lorenzo Colitti89faa342016-02-26 11:38:47 +090029
30
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090031class FirewallControllerTest : public IptablesBaseTest {
Lorenzo Colitti89faa342016-02-26 11:38:47 +090032protected:
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090033 FirewallControllerTest() {
34 FirewallController::execIptables = fakeExecIptables;
35 FirewallController::execIptablesSilently = fakeExecIptables;
36 FirewallController::execIptablesRestore = fakeExecIptablesRestore;
37 }
Lorenzo Colitti89faa342016-02-26 11:38:47 +090038 FirewallController mFw;
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090039
Lorenzo Colittif157caf2016-05-13 11:25:54 +090040 std::string makeUidRules(IptablesTarget a, const char* b, bool c,
41 const std::vector<int32_t>& d) {
42 return mFw.makeUidRules(a, b, c, d);
Lorenzo Colitti89faa342016-02-26 11:38:47 +090043 }
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090044
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +090045 int createChain(const char* a, FirewallType b) {
46 return mFw.createChain(a, b);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090047 }
Lorenzo Colitti89faa342016-02-26 11:38:47 +090048};
49
50
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090051TEST_F(FirewallControllerTest, TestCreateWhitelistChain) {
Lorenzo Colittia55388e2016-05-13 17:03:42 +090052 std::vector<std::string> expectedRestore4 = {
53 "*filter",
54 ":fw_whitelist -",
Lorenzo Colitti8bcb1f42017-04-25 00:17:48 +090055 "-A fw_whitelist -m owner --uid-owner 0-9999 -j RETURN",
Lorenzo Colitti50b198a2017-03-30 02:50:09 +090056 "-A fw_whitelist -i lo -j RETURN",
57 "-A fw_whitelist -o lo -j RETURN",
Lorenzo Colittia55388e2016-05-13 17:03:42 +090058 "-A fw_whitelist -p tcp --tcp-flags RST RST -j RETURN",
Lorenzo Colittia55388e2016-05-13 17:03:42 +090059 "-A fw_whitelist -j DROP",
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +090060 "COMMIT\n"
Lorenzo Colittia55388e2016-05-13 17:03:42 +090061 };
62 std::vector<std::string> expectedRestore6 = {
63 "*filter",
64 ":fw_whitelist -",
Lorenzo Colitti8bcb1f42017-04-25 00:17:48 +090065 "-A fw_whitelist -m owner --uid-owner 0-9999 -j RETURN",
Lorenzo Colitti50b198a2017-03-30 02:50:09 +090066 "-A fw_whitelist -i lo -j RETURN",
67 "-A fw_whitelist -o lo -j RETURN",
Lorenzo Colittia55388e2016-05-13 17:03:42 +090068 "-A fw_whitelist -p tcp --tcp-flags RST RST -j RETURN",
69 "-A fw_whitelist -p icmpv6 --icmpv6-type packet-too-big -j RETURN",
70 "-A fw_whitelist -p icmpv6 --icmpv6-type router-solicitation -j RETURN",
71 "-A fw_whitelist -p icmpv6 --icmpv6-type router-advertisement -j RETURN",
72 "-A fw_whitelist -p icmpv6 --icmpv6-type neighbour-solicitation -j RETURN",
73 "-A fw_whitelist -p icmpv6 --icmpv6-type neighbour-advertisement -j RETURN",
74 "-A fw_whitelist -p icmpv6 --icmpv6-type redirect -j RETURN",
Lorenzo Colittia55388e2016-05-13 17:03:42 +090075 "-A fw_whitelist -j DROP",
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +090076 "COMMIT\n"
Lorenzo Colittia55388e2016-05-13 17:03:42 +090077 };
78 std::vector<std::pair<IptablesTarget, std::string>> expectedRestoreCommands = {
79 { V4, android::base::Join(expectedRestore4, '\n') },
80 { V6, android::base::Join(expectedRestore6, '\n') },
81 };
82
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +090083 createChain("fw_whitelist", WHITELIST);
Lorenzo Colittia55388e2016-05-13 17:03:42 +090084 expectIptablesRestoreCommands(expectedRestoreCommands);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +090085}
86
87TEST_F(FirewallControllerTest, TestCreateBlacklistChain) {
Lorenzo Colittia55388e2016-05-13 17:03:42 +090088 std::vector<std::string> expectedRestore = {
89 "*filter",
90 ":fw_blacklist -",
Lorenzo Colitti50b198a2017-03-30 02:50:09 +090091 "-A fw_blacklist -i lo -j RETURN",
92 "-A fw_blacklist -o lo -j RETURN",
Lorenzo Colittia55388e2016-05-13 17:03:42 +090093 "-A fw_blacklist -p tcp --tcp-flags RST RST -j RETURN",
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +090094 "COMMIT\n"
Lorenzo Colittia55388e2016-05-13 17:03:42 +090095 };
96 std::vector<std::pair<IptablesTarget, std::string>> expectedRestoreCommands = {
97 { V4, android::base::Join(expectedRestore, '\n') },
98 { V6, android::base::Join(expectedRestore, '\n') },
99 };
100
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +0900101 createChain("fw_blacklist", BLACKLIST);
Lorenzo Colittia55388e2016-05-13 17:03:42 +0900102 expectIptablesRestoreCommands(expectedRestoreCommands);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900103}
104
105TEST_F(FirewallControllerTest, TestSetStandbyRule) {
106 ExpectedIptablesCommands expected = {
Lorenzo Colittia7357652017-04-25 00:16:36 +0900107 { V4V6, "*filter\n-D fw_standby -m owner --uid-owner 12345 -j DROP\nCOMMIT\n" }
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900108 };
109 mFw.setUidRule(STANDBY, 12345, ALLOW);
Lorenzo Colittia7357652017-04-25 00:16:36 +0900110 expectIptablesRestoreCommands(expected);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900111
112 expected = {
Lorenzo Colittia7357652017-04-25 00:16:36 +0900113 { V4V6, "*filter\n-A fw_standby -m owner --uid-owner 12345 -j DROP\nCOMMIT\n" }
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900114 };
115 mFw.setUidRule(STANDBY, 12345, DENY);
Lorenzo Colittia7357652017-04-25 00:16:36 +0900116 expectIptablesRestoreCommands(expected);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900117}
118
119TEST_F(FirewallControllerTest, TestSetDozeRule) {
120 ExpectedIptablesCommands expected = {
Lorenzo Colittia7357652017-04-25 00:16:36 +0900121 { V4V6, "*filter\n-I fw_dozable -m owner --uid-owner 54321 -j RETURN\nCOMMIT\n" }
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900122 };
123 mFw.setUidRule(DOZABLE, 54321, ALLOW);
Lorenzo Colittia7357652017-04-25 00:16:36 +0900124 expectIptablesRestoreCommands(expected);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900125
126 expected = {
Lorenzo Colittia7357652017-04-25 00:16:36 +0900127 { V4V6, "*filter\n-D fw_dozable -m owner --uid-owner 54321 -j RETURN\nCOMMIT\n" }
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900128 };
129 mFw.setUidRule(DOZABLE, 54321, DENY);
Lorenzo Colittia7357652017-04-25 00:16:36 +0900130 expectIptablesRestoreCommands(expected);
131}
132
133TEST_F(FirewallControllerTest, TestSetFirewallRule) {
134 ExpectedIptablesCommands expected = {
135 { V4V6, "*filter\n"
136 "-A fw_INPUT -m owner --uid-owner 54321 -j DROP\n"
137 "-A fw_OUTPUT -m owner --uid-owner 54321 -j DROP\n"
138 "COMMIT\n" }
139 };
140 mFw.setUidRule(NONE, 54321, DENY);
141 expectIptablesRestoreCommands(expected);
142
143 expected = {
144 { V4V6, "*filter\n"
145 "-D fw_INPUT -m owner --uid-owner 54321 -j DROP\n"
146 "-D fw_OUTPUT -m owner --uid-owner 54321 -j DROP\n"
147 "COMMIT\n" }
148 };
149 mFw.setUidRule(NONE, 54321, ALLOW);
150 expectIptablesRestoreCommands(expected);
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900151}
152
153TEST_F(FirewallControllerTest, TestReplaceWhitelistUidRule) {
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900154 std::string expected =
155 "*filter\n"
156 ":FW_whitechain -\n"
Lorenzo Colitti8bcb1f42017-04-25 00:17:48 +0900157 "-A FW_whitechain -m owner --uid-owner 10023 -j RETURN\n"
158 "-A FW_whitechain -m owner --uid-owner 10059 -j RETURN\n"
159 "-A FW_whitechain -m owner --uid-owner 10124 -j RETURN\n"
160 "-A FW_whitechain -m owner --uid-owner 10111 -j RETURN\n"
161 "-A FW_whitechain -m owner --uid-owner 110122 -j RETURN\n"
162 "-A FW_whitechain -m owner --uid-owner 210153 -j RETURN\n"
163 "-A FW_whitechain -m owner --uid-owner 210024 -j RETURN\n"
164 "-A FW_whitechain -m owner --uid-owner 0-9999 -j RETURN\n"
Lorenzo Colitti50b198a2017-03-30 02:50:09 +0900165 "-A FW_whitechain -i lo -j RETURN\n"
166 "-A FW_whitechain -o lo -j RETURN\n"
Lorenzo Colittif157caf2016-05-13 11:25:54 +0900167 "-A FW_whitechain -p tcp --tcp-flags RST RST -j RETURN\n"
168 "-A FW_whitechain -p icmpv6 --icmpv6-type packet-too-big -j RETURN\n"
169 "-A FW_whitechain -p icmpv6 --icmpv6-type router-solicitation -j RETURN\n"
170 "-A FW_whitechain -p icmpv6 --icmpv6-type router-advertisement -j RETURN\n"
171 "-A FW_whitechain -p icmpv6 --icmpv6-type neighbour-solicitation -j RETURN\n"
172 "-A FW_whitechain -p icmpv6 --icmpv6-type neighbour-advertisement -j RETURN\n"
173 "-A FW_whitechain -p icmpv6 --icmpv6-type redirect -j RETURN\n"
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900174 "-A FW_whitechain -j DROP\n"
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +0900175 "COMMIT\n";
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900176
177 std::vector<int32_t> uids = { 10023, 10059, 10124, 10111, 110122, 210153, 210024 };
Lorenzo Colittif157caf2016-05-13 11:25:54 +0900178 EXPECT_EQ(expected, makeUidRules(V6, "FW_whitechain", true, uids));
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900179}
180
Lorenzo Colitti932c44c2016-04-24 16:58:02 +0900181TEST_F(FirewallControllerTest, TestReplaceBlacklistUidRule) {
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900182 std::string expected =
183 "*filter\n"
184 ":FW_blackchain -\n"
Lorenzo Colitti50b198a2017-03-30 02:50:09 +0900185 "-A FW_blackchain -i lo -j RETURN\n"
186 "-A FW_blackchain -o lo -j RETURN\n"
Lorenzo Colittif157caf2016-05-13 11:25:54 +0900187 "-A FW_blackchain -p tcp --tcp-flags RST RST -j RETURN\n"
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900188 "-A FW_blackchain -m owner --uid-owner 10023 -j DROP\n"
189 "-A FW_blackchain -m owner --uid-owner 10059 -j DROP\n"
190 "-A FW_blackchain -m owner --uid-owner 10124 -j DROP\n"
Lorenzo Colitti03b23fe2017-02-03 18:46:53 +0900191 "COMMIT\n";
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900192
193 std::vector<int32_t> uids = { 10023, 10059, 10124 };
Lorenzo Colittif157caf2016-05-13 11:25:54 +0900194 EXPECT_EQ(expected, makeUidRules(V4 ,"FW_blackchain", false, uids));
Lorenzo Colitti89faa342016-02-26 11:38:47 +0900195}
Lorenzo Colittidd9a54b2017-04-26 16:13:22 +0900196
197TEST_F(FirewallControllerTest, TestEnableChildChains) {
198 std::vector<std::string> expected = {
Lorenzo Colittia1611962017-04-26 16:30:39 +0900199 "*filter\n"
200 "-A fw_INPUT -j fw_dozable\n"
201 "-A fw_OUTPUT -j fw_dozable\n"
202 "COMMIT\n"
Lorenzo Colittidd9a54b2017-04-26 16:13:22 +0900203 };
204 EXPECT_EQ(0, mFw.enableChildChains(DOZABLE, true));
Lorenzo Colittia1611962017-04-26 16:30:39 +0900205 expectIptablesRestoreCommands(expected);
Lorenzo Colittidd9a54b2017-04-26 16:13:22 +0900206
207 expected = {
Lorenzo Colittia1611962017-04-26 16:30:39 +0900208 "*filter\n"
209 "-D fw_INPUT -j fw_powersave\n"
210 "-D fw_OUTPUT -j fw_powersave\n"
211 "COMMIT\n"
Lorenzo Colittidd9a54b2017-04-26 16:13:22 +0900212 };
213 EXPECT_EQ(0, mFw.enableChildChains(POWERSAVE, false));
Lorenzo Colittia1611962017-04-26 16:30:39 +0900214 expectIptablesRestoreCommands(expected);
Lorenzo Colittidd9a54b2017-04-26 16:13:22 +0900215}