Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2016 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | * |
| 16 | * FirewallControllerTest.cpp - unit tests for FirewallController.cpp |
| 17 | */ |
| 18 | |
| 19 | #include <string> |
| 20 | #include <vector> |
| 21 | #include <stdio.h> |
| 22 | |
| 23 | #include <gtest/gtest.h> |
| 24 | |
Hugo Benichi | 528d3d0 | 2018-06-20 13:35:58 +0900 | [diff] [blame] | 25 | #include <android-base/file.h> |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 26 | #include <android-base/stringprintf.h> |
Hugo Benichi | 528d3d0 | 2018-06-20 13:35:58 +0900 | [diff] [blame] | 27 | #include <android-base/strings.h> |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 28 | |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 29 | #include "FirewallController.h" |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 30 | #include "IptablesBaseTest.h" |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 31 | |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 32 | using android::base::Join; |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 33 | using android::base::StringPrintf; |
Hugo Benichi | 528d3d0 | 2018-06-20 13:35:58 +0900 | [diff] [blame] | 34 | using android::base::WriteStringToFile; |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 35 | |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame^] | 36 | namespace android { |
| 37 | namespace net { |
| 38 | |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 39 | class FirewallControllerTest : public IptablesBaseTest { |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 40 | protected: |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 41 | FirewallControllerTest() { |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 42 | FirewallController::execIptablesRestore = fakeExecIptablesRestore; |
Chenbo Feng | 89c12f1 | 2018-03-21 10:29:18 -0700 | [diff] [blame] | 43 | mFw.mUseBpfOwnerMatch = false; |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 44 | } |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 45 | FirewallController mFw; |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 46 | |
Lorenzo Colitti | f157caf | 2016-05-13 11:25:54 +0900 | [diff] [blame] | 47 | std::string makeUidRules(IptablesTarget a, const char* b, bool c, |
| 48 | const std::vector<int32_t>& d) { |
| 49 | return mFw.makeUidRules(a, b, c, d); |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 50 | } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 51 | |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 52 | int createChain(const char* a, FirewallType b) { |
| 53 | return mFw.createChain(a, b); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 54 | } |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 55 | }; |
| 56 | |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 57 | TEST_F(FirewallControllerTest, TestCreateWhitelistChain) { |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 58 | std::vector<std::string> expectedRestore4 = { |
| 59 | "*filter", |
| 60 | ":fw_whitelist -", |
Lorenzo Colitti | 8bcb1f4 | 2017-04-25 00:17:48 +0900 | [diff] [blame] | 61 | "-A fw_whitelist -m owner --uid-owner 0-9999 -j RETURN", |
Benedict Wong | b2daefb | 2017-12-06 22:05:46 -0800 | [diff] [blame] | 62 | "-A fw_whitelist -m owner ! --uid-owner 0-4294967294 -j RETURN", |
| 63 | "-A fw_whitelist -p esp -j RETURN", |
Lorenzo Colitti | 50b198a | 2017-03-30 02:50:09 +0900 | [diff] [blame] | 64 | "-A fw_whitelist -i lo -j RETURN", |
| 65 | "-A fw_whitelist -o lo -j RETURN", |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 66 | "-A fw_whitelist -p tcp --tcp-flags RST RST -j RETURN", |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 67 | "-A fw_whitelist -j DROP", |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 68 | "COMMIT\n" |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 69 | }; |
| 70 | std::vector<std::string> expectedRestore6 = { |
| 71 | "*filter", |
| 72 | ":fw_whitelist -", |
Lorenzo Colitti | 8bcb1f4 | 2017-04-25 00:17:48 +0900 | [diff] [blame] | 73 | "-A fw_whitelist -m owner --uid-owner 0-9999 -j RETURN", |
Benedict Wong | b2daefb | 2017-12-06 22:05:46 -0800 | [diff] [blame] | 74 | "-A fw_whitelist -m owner ! --uid-owner 0-4294967294 -j RETURN", |
| 75 | "-A fw_whitelist -p esp -j RETURN", |
Lorenzo Colitti | 50b198a | 2017-03-30 02:50:09 +0900 | [diff] [blame] | 76 | "-A fw_whitelist -i lo -j RETURN", |
| 77 | "-A fw_whitelist -o lo -j RETURN", |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 78 | "-A fw_whitelist -p tcp --tcp-flags RST RST -j RETURN", |
| 79 | "-A fw_whitelist -p icmpv6 --icmpv6-type packet-too-big -j RETURN", |
| 80 | "-A fw_whitelist -p icmpv6 --icmpv6-type router-solicitation -j RETURN", |
| 81 | "-A fw_whitelist -p icmpv6 --icmpv6-type router-advertisement -j RETURN", |
| 82 | "-A fw_whitelist -p icmpv6 --icmpv6-type neighbour-solicitation -j RETURN", |
| 83 | "-A fw_whitelist -p icmpv6 --icmpv6-type neighbour-advertisement -j RETURN", |
| 84 | "-A fw_whitelist -p icmpv6 --icmpv6-type redirect -j RETURN", |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 85 | "-A fw_whitelist -j DROP", |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 86 | "COMMIT\n" |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 87 | }; |
| 88 | std::vector<std::pair<IptablesTarget, std::string>> expectedRestoreCommands = { |
| 89 | { V4, android::base::Join(expectedRestore4, '\n') }, |
| 90 | { V6, android::base::Join(expectedRestore6, '\n') }, |
| 91 | }; |
| 92 | |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 93 | createChain("fw_whitelist", WHITELIST); |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 94 | expectIptablesRestoreCommands(expectedRestoreCommands); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 95 | } |
| 96 | |
| 97 | TEST_F(FirewallControllerTest, TestCreateBlacklistChain) { |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 98 | std::vector<std::string> expectedRestore = { |
| 99 | "*filter", |
| 100 | ":fw_blacklist -", |
Lorenzo Colitti | 50b198a | 2017-03-30 02:50:09 +0900 | [diff] [blame] | 101 | "-A fw_blacklist -i lo -j RETURN", |
| 102 | "-A fw_blacklist -o lo -j RETURN", |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 103 | "-A fw_blacklist -p tcp --tcp-flags RST RST -j RETURN", |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 104 | "COMMIT\n" |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 105 | }; |
| 106 | std::vector<std::pair<IptablesTarget, std::string>> expectedRestoreCommands = { |
| 107 | { V4, android::base::Join(expectedRestore, '\n') }, |
| 108 | { V6, android::base::Join(expectedRestore, '\n') }, |
| 109 | }; |
| 110 | |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 111 | createChain("fw_blacklist", BLACKLIST); |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 112 | expectIptablesRestoreCommands(expectedRestoreCommands); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 113 | } |
| 114 | |
| 115 | TEST_F(FirewallControllerTest, TestSetStandbyRule) { |
| 116 | ExpectedIptablesCommands expected = { |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 117 | { V4V6, "*filter\n-D fw_standby -m owner --uid-owner 12345 -j DROP\nCOMMIT\n" } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 118 | }; |
| 119 | mFw.setUidRule(STANDBY, 12345, ALLOW); |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 120 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 121 | |
| 122 | expected = { |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 123 | { V4V6, "*filter\n-A fw_standby -m owner --uid-owner 12345 -j DROP\nCOMMIT\n" } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 124 | }; |
| 125 | mFw.setUidRule(STANDBY, 12345, DENY); |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 126 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 127 | } |
| 128 | |
| 129 | TEST_F(FirewallControllerTest, TestSetDozeRule) { |
| 130 | ExpectedIptablesCommands expected = { |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 131 | { V4V6, "*filter\n-I fw_dozable -m owner --uid-owner 54321 -j RETURN\nCOMMIT\n" } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 132 | }; |
| 133 | mFw.setUidRule(DOZABLE, 54321, ALLOW); |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 134 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 135 | |
| 136 | expected = { |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 137 | { V4V6, "*filter\n-D fw_dozable -m owner --uid-owner 54321 -j RETURN\nCOMMIT\n" } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 138 | }; |
| 139 | mFw.setUidRule(DOZABLE, 54321, DENY); |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 140 | expectIptablesRestoreCommands(expected); |
| 141 | } |
| 142 | |
| 143 | TEST_F(FirewallControllerTest, TestSetFirewallRule) { |
| 144 | ExpectedIptablesCommands expected = { |
| 145 | { V4V6, "*filter\n" |
| 146 | "-A fw_INPUT -m owner --uid-owner 54321 -j DROP\n" |
| 147 | "-A fw_OUTPUT -m owner --uid-owner 54321 -j DROP\n" |
| 148 | "COMMIT\n" } |
| 149 | }; |
| 150 | mFw.setUidRule(NONE, 54321, DENY); |
| 151 | expectIptablesRestoreCommands(expected); |
| 152 | |
| 153 | expected = { |
| 154 | { V4V6, "*filter\n" |
| 155 | "-D fw_INPUT -m owner --uid-owner 54321 -j DROP\n" |
| 156 | "-D fw_OUTPUT -m owner --uid-owner 54321 -j DROP\n" |
| 157 | "COMMIT\n" } |
| 158 | }; |
| 159 | mFw.setUidRule(NONE, 54321, ALLOW); |
| 160 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 161 | } |
| 162 | |
| 163 | TEST_F(FirewallControllerTest, TestReplaceWhitelistUidRule) { |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 164 | std::string expected = |
| 165 | "*filter\n" |
| 166 | ":FW_whitechain -\n" |
Lorenzo Colitti | 8bcb1f4 | 2017-04-25 00:17:48 +0900 | [diff] [blame] | 167 | "-A FW_whitechain -m owner --uid-owner 10023 -j RETURN\n" |
| 168 | "-A FW_whitechain -m owner --uid-owner 10059 -j RETURN\n" |
| 169 | "-A FW_whitechain -m owner --uid-owner 10124 -j RETURN\n" |
| 170 | "-A FW_whitechain -m owner --uid-owner 10111 -j RETURN\n" |
| 171 | "-A FW_whitechain -m owner --uid-owner 110122 -j RETURN\n" |
| 172 | "-A FW_whitechain -m owner --uid-owner 210153 -j RETURN\n" |
| 173 | "-A FW_whitechain -m owner --uid-owner 210024 -j RETURN\n" |
| 174 | "-A FW_whitechain -m owner --uid-owner 0-9999 -j RETURN\n" |
Benedict Wong | b2daefb | 2017-12-06 22:05:46 -0800 | [diff] [blame] | 175 | "-A FW_whitechain -m owner ! --uid-owner 0-4294967294 -j RETURN\n" |
| 176 | "-A FW_whitechain -p esp -j RETURN\n" |
Lorenzo Colitti | 50b198a | 2017-03-30 02:50:09 +0900 | [diff] [blame] | 177 | "-A FW_whitechain -i lo -j RETURN\n" |
| 178 | "-A FW_whitechain -o lo -j RETURN\n" |
Lorenzo Colitti | f157caf | 2016-05-13 11:25:54 +0900 | [diff] [blame] | 179 | "-A FW_whitechain -p tcp --tcp-flags RST RST -j RETURN\n" |
| 180 | "-A FW_whitechain -p icmpv6 --icmpv6-type packet-too-big -j RETURN\n" |
| 181 | "-A FW_whitechain -p icmpv6 --icmpv6-type router-solicitation -j RETURN\n" |
| 182 | "-A FW_whitechain -p icmpv6 --icmpv6-type router-advertisement -j RETURN\n" |
| 183 | "-A FW_whitechain -p icmpv6 --icmpv6-type neighbour-solicitation -j RETURN\n" |
| 184 | "-A FW_whitechain -p icmpv6 --icmpv6-type neighbour-advertisement -j RETURN\n" |
| 185 | "-A FW_whitechain -p icmpv6 --icmpv6-type redirect -j RETURN\n" |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 186 | "-A FW_whitechain -j DROP\n" |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 187 | "COMMIT\n"; |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 188 | |
| 189 | std::vector<int32_t> uids = { 10023, 10059, 10124, 10111, 110122, 210153, 210024 }; |
Lorenzo Colitti | f157caf | 2016-05-13 11:25:54 +0900 | [diff] [blame] | 190 | EXPECT_EQ(expected, makeUidRules(V6, "FW_whitechain", true, uids)); |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 191 | } |
| 192 | |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 193 | TEST_F(FirewallControllerTest, TestReplaceBlacklistUidRule) { |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 194 | std::string expected = |
| 195 | "*filter\n" |
| 196 | ":FW_blackchain -\n" |
Lorenzo Colitti | 50b198a | 2017-03-30 02:50:09 +0900 | [diff] [blame] | 197 | "-A FW_blackchain -i lo -j RETURN\n" |
| 198 | "-A FW_blackchain -o lo -j RETURN\n" |
Lorenzo Colitti | f157caf | 2016-05-13 11:25:54 +0900 | [diff] [blame] | 199 | "-A FW_blackchain -p tcp --tcp-flags RST RST -j RETURN\n" |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 200 | "-A FW_blackchain -m owner --uid-owner 10023 -j DROP\n" |
| 201 | "-A FW_blackchain -m owner --uid-owner 10059 -j DROP\n" |
| 202 | "-A FW_blackchain -m owner --uid-owner 10124 -j DROP\n" |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 203 | "COMMIT\n"; |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 204 | |
| 205 | std::vector<int32_t> uids = { 10023, 10059, 10124 }; |
Lorenzo Colitti | f157caf | 2016-05-13 11:25:54 +0900 | [diff] [blame] | 206 | EXPECT_EQ(expected, makeUidRules(V4 ,"FW_blackchain", false, uids)); |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 207 | } |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 208 | |
| 209 | TEST_F(FirewallControllerTest, TestEnableChildChains) { |
| 210 | std::vector<std::string> expected = { |
Lorenzo Colitti | a161196 | 2017-04-26 16:30:39 +0900 | [diff] [blame] | 211 | "*filter\n" |
| 212 | "-A fw_INPUT -j fw_dozable\n" |
| 213 | "-A fw_OUTPUT -j fw_dozable\n" |
| 214 | "COMMIT\n" |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 215 | }; |
| 216 | EXPECT_EQ(0, mFw.enableChildChains(DOZABLE, true)); |
Lorenzo Colitti | a161196 | 2017-04-26 16:30:39 +0900 | [diff] [blame] | 217 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 218 | |
| 219 | expected = { |
Lorenzo Colitti | a161196 | 2017-04-26 16:30:39 +0900 | [diff] [blame] | 220 | "*filter\n" |
| 221 | "-D fw_INPUT -j fw_powersave\n" |
| 222 | "-D fw_OUTPUT -j fw_powersave\n" |
| 223 | "COMMIT\n" |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 224 | }; |
| 225 | EXPECT_EQ(0, mFw.enableChildChains(POWERSAVE, false)); |
Lorenzo Colitti | a161196 | 2017-04-26 16:30:39 +0900 | [diff] [blame] | 226 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 227 | } |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 228 | |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 229 | TEST_F(FirewallControllerTest, TestFirewall) { |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 230 | std::vector<std::string> enableCommands = { |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 231 | "*filter\n" |
| 232 | "-A fw_INPUT -j DROP\n" |
| 233 | "-A fw_OUTPUT -j REJECT\n" |
| 234 | "-A fw_FORWARD -j REJECT\n" |
| 235 | "COMMIT\n" |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 236 | }; |
| 237 | std::vector<std::string> disableCommands = { |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 238 | "*filter\n" |
| 239 | ":fw_INPUT -\n" |
| 240 | ":fw_OUTPUT -\n" |
| 241 | ":fw_FORWARD -\n" |
| 242 | "COMMIT\n" |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 243 | }; |
| 244 | std::vector<std::string> noCommands = {}; |
| 245 | |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame^] | 246 | EXPECT_EQ(0, mFw.resetFirewall()); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 247 | expectIptablesRestoreCommands(disableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 248 | |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame^] | 249 | EXPECT_EQ(0, mFw.resetFirewall()); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 250 | expectIptablesRestoreCommands(disableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 251 | |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame^] | 252 | EXPECT_EQ(0, mFw.setFirewallType(BLACKLIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 253 | expectIptablesRestoreCommands(disableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 254 | |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame^] | 255 | EXPECT_EQ(0, mFw.setFirewallType(BLACKLIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 256 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 257 | |
| 258 | std::vector<std::string> disableEnableCommands; |
| 259 | disableEnableCommands.insert( |
| 260 | disableEnableCommands.end(), disableCommands.begin(), disableCommands.end()); |
| 261 | disableEnableCommands.insert( |
| 262 | disableEnableCommands.end(), enableCommands.begin(), enableCommands.end()); |
| 263 | |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame^] | 264 | EXPECT_EQ(0, mFw.setFirewallType(WHITELIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 265 | expectIptablesRestoreCommands(disableEnableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 266 | |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 267 | std::vector<std::string> ifaceCommands = { |
Lorenzo Colitti | 1411d45 | 2017-07-17 22:12:15 +0900 | [diff] [blame] | 268 | "*filter\n" |
| 269 | "-I fw_INPUT -i rmnet_data0 -j RETURN\n" |
| 270 | "-I fw_OUTPUT -o rmnet_data0 -j RETURN\n" |
| 271 | "COMMIT\n" |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 272 | }; |
| 273 | EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); |
Lorenzo Colitti | 1411d45 | 2017-07-17 22:12:15 +0900 | [diff] [blame] | 274 | expectIptablesRestoreCommands(ifaceCommands); |
| 275 | |
| 276 | EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); |
| 277 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 278 | |
| 279 | ifaceCommands = { |
Lorenzo Colitti | 1411d45 | 2017-07-17 22:12:15 +0900 | [diff] [blame] | 280 | "*filter\n" |
| 281 | "-D fw_INPUT -i rmnet_data0 -j RETURN\n" |
| 282 | "-D fw_OUTPUT -o rmnet_data0 -j RETURN\n" |
| 283 | "COMMIT\n" |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 284 | }; |
| 285 | EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", DENY)); |
Lorenzo Colitti | 1411d45 | 2017-07-17 22:12:15 +0900 | [diff] [blame] | 286 | expectIptablesRestoreCommands(ifaceCommands); |
| 287 | |
| 288 | EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", DENY)); |
| 289 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 290 | |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame^] | 291 | EXPECT_EQ(0, mFw.setFirewallType(WHITELIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 292 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 293 | |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame^] | 294 | EXPECT_EQ(0, mFw.resetFirewall()); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 295 | expectIptablesRestoreCommands(disableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 296 | |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame^] | 297 | // TODO: calling resetFirewall and then setFirewallType(WHITELIST) does |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 298 | // nothing. This seems like a clear bug. |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame^] | 299 | EXPECT_EQ(0, mFw.setFirewallType(WHITELIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 300 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 301 | } |
Hugo Benichi | 528d3d0 | 2018-06-20 13:35:58 +0900 | [diff] [blame] | 302 | |
| 303 | TEST_F(FirewallControllerTest, TestDiscoverMaximumValidUid) { |
| 304 | struct { |
| 305 | const std::string description; |
| 306 | const std::string content; |
| 307 | const uint32_t expected; |
| 308 | } testCases[] = { |
| 309 | { |
| 310 | .description = "root namespace case", |
| 311 | .content = " 0 0 4294967295", |
| 312 | .expected = 4294967294, |
| 313 | }, |
| 314 | { |
| 315 | .description = "container namespace case", |
| 316 | .content = " 0 655360 5000\n" |
| 317 | " 5000 600 50\n" |
| 318 | " 5050 660410 1994950\n", |
| 319 | .expected = 1999999, |
| 320 | }, |
| 321 | { |
| 322 | .description = "garbage content case", |
| 323 | .content = "garbage", |
| 324 | .expected = 4294967294, |
| 325 | }, |
| 326 | { |
| 327 | .description = "no content case", |
| 328 | .content = "", |
| 329 | .expected = 4294967294, |
| 330 | }, |
| 331 | }; |
| 332 | |
| 333 | const std::string tempFile = "/data/local/tmp/fake_uid_mapping"; |
| 334 | |
| 335 | for (const auto& test : testCases) { |
| 336 | EXPECT_TRUE(WriteStringToFile(test.content, tempFile, false)); |
| 337 | uint32_t got = FirewallController::discoverMaximumValidUid(tempFile); |
| 338 | EXPECT_EQ(0, remove(tempFile.c_str())); |
| 339 | if (got != test.expected) { |
| 340 | FAIL() << test.description << ":\n" |
| 341 | << test.content << "\ngot " << got << ", but expected " << test.expected; |
| 342 | } |
| 343 | } |
| 344 | |
| 345 | // Also check when the file is not defined |
| 346 | EXPECT_NE(0, access(tempFile.c_str(), F_OK)); |
| 347 | EXPECT_EQ(4294967294, FirewallController::discoverMaximumValidUid(tempFile)); |
| 348 | } |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame^] | 349 | |
| 350 | } // namespace net |
| 351 | } // namespace android |