Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2016 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | * |
| 16 | * FirewallControllerTest.cpp - unit tests for FirewallController.cpp |
| 17 | */ |
| 18 | |
| 19 | #include <string> |
| 20 | #include <vector> |
| 21 | #include <stdio.h> |
| 22 | |
| 23 | #include <gtest/gtest.h> |
| 24 | |
Hugo Benichi | 528d3d0 | 2018-06-20 13:35:58 +0900 | [diff] [blame] | 25 | #include <android-base/file.h> |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 26 | #include <android-base/stringprintf.h> |
Hugo Benichi | 528d3d0 | 2018-06-20 13:35:58 +0900 | [diff] [blame] | 27 | #include <android-base/strings.h> |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 28 | |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 29 | #include "FirewallController.h" |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 30 | #include "IptablesBaseTest.h" |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 31 | |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 32 | using android::base::Join; |
Hugo Benichi | 528d3d0 | 2018-06-20 13:35:58 +0900 | [diff] [blame] | 33 | using android::base::WriteStringToFile; |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 34 | |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame] | 35 | namespace android { |
| 36 | namespace net { |
| 37 | |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 38 | class FirewallControllerTest : public IptablesBaseTest { |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 39 | protected: |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 40 | FirewallControllerTest() { |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 41 | FirewallController::execIptablesRestore = fakeExecIptablesRestore; |
Chenbo Feng | 47dd073 | 2018-12-11 12:23:24 -0800 | [diff] [blame] | 42 | // This unit test currently doesn't cover the eBPF owner match case so |
| 43 | // we have to manually turn eBPF support off. |
| 44 | // TODO: find a way to unit test the eBPF code path. |
Maciej Żenczykowski | 10a5892 | 2020-02-11 15:40:19 -0800 | [diff] [blame] | 45 | mFw.mUseBpfOwnerMatch = false; |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 46 | } |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 47 | FirewallController mFw; |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 48 | |
Lorenzo Colitti | f157caf | 2016-05-13 11:25:54 +0900 | [diff] [blame] | 49 | std::string makeUidRules(IptablesTarget a, const char* b, bool c, |
| 50 | const std::vector<int32_t>& d) { |
| 51 | return mFw.makeUidRules(a, b, c, d); |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 52 | } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 53 | |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 54 | int createChain(const char* a, FirewallType b) { |
| 55 | return mFw.createChain(a, b); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 56 | } |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 57 | }; |
| 58 | |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 59 | TEST_F(FirewallControllerTest, TestCreateAllowlistChain) { |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 60 | std::vector<std::string> expectedRestore4 = { |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 61 | "*filter", |
| 62 | ":fw_allowlist -", |
| 63 | "-A fw_allowlist -m owner --uid-owner 0-9999 -j RETURN", |
| 64 | "-A fw_allowlist -m owner ! --uid-owner 0-4294967294 -j RETURN", |
| 65 | "-A fw_allowlist -p esp -j RETURN", |
| 66 | "-A fw_allowlist -i lo -j RETURN", |
| 67 | "-A fw_allowlist -o lo -j RETURN", |
| 68 | "-A fw_allowlist -p tcp --tcp-flags RST RST -j RETURN", |
| 69 | "-A fw_allowlist -j DROP", |
| 70 | "COMMIT\n"}; |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 71 | std::vector<std::string> expectedRestore6 = { |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 72 | "*filter", |
| 73 | ":fw_allowlist -", |
| 74 | "-A fw_allowlist -m owner --uid-owner 0-9999 -j RETURN", |
| 75 | "-A fw_allowlist -m owner ! --uid-owner 0-4294967294 -j RETURN", |
| 76 | "-A fw_allowlist -p esp -j RETURN", |
| 77 | "-A fw_allowlist -i lo -j RETURN", |
| 78 | "-A fw_allowlist -o lo -j RETURN", |
| 79 | "-A fw_allowlist -p tcp --tcp-flags RST RST -j RETURN", |
| 80 | "-A fw_allowlist -p icmpv6 --icmpv6-type packet-too-big -j RETURN", |
| 81 | "-A fw_allowlist -p icmpv6 --icmpv6-type router-solicitation -j RETURN", |
| 82 | "-A fw_allowlist -p icmpv6 --icmpv6-type router-advertisement -j RETURN", |
| 83 | "-A fw_allowlist -p icmpv6 --icmpv6-type neighbour-solicitation -j RETURN", |
| 84 | "-A fw_allowlist -p icmpv6 --icmpv6-type neighbour-advertisement -j RETURN", |
| 85 | "-A fw_allowlist -p icmpv6 --icmpv6-type redirect -j RETURN", |
| 86 | "-A fw_allowlist -j DROP", |
| 87 | "COMMIT\n"}; |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 88 | std::vector<std::pair<IptablesTarget, std::string>> expectedRestoreCommands = { |
Bernie Innocenti | a5161a0 | 2019-01-30 22:40:53 +0900 | [diff] [blame] | 89 | {V4, Join(expectedRestore4, '\n')}, |
| 90 | {V6, Join(expectedRestore6, '\n')}, |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 91 | }; |
| 92 | |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 93 | createChain("fw_allowlist", ALLOWLIST); |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 94 | expectIptablesRestoreCommands(expectedRestoreCommands); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 95 | } |
| 96 | |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 97 | TEST_F(FirewallControllerTest, TestCreateDenylistChain) { |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 98 | std::vector<std::string> expectedRestore = { |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 99 | "*filter", |
| 100 | ":fw_denylist -", |
| 101 | "-A fw_denylist -i lo -j RETURN", |
| 102 | "-A fw_denylist -o lo -j RETURN", |
| 103 | "-A fw_denylist -p tcp --tcp-flags RST RST -j RETURN", |
| 104 | "COMMIT\n"}; |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 105 | std::vector<std::pair<IptablesTarget, std::string>> expectedRestoreCommands = { |
Bernie Innocenti | a5161a0 | 2019-01-30 22:40:53 +0900 | [diff] [blame] | 106 | {V4, Join(expectedRestore, '\n')}, |
| 107 | {V6, Join(expectedRestore, '\n')}, |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 108 | }; |
| 109 | |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 110 | createChain("fw_denylist", DENYLIST); |
Lorenzo Colitti | a55388e | 2016-05-13 17:03:42 +0900 | [diff] [blame] | 111 | expectIptablesRestoreCommands(expectedRestoreCommands); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 112 | } |
| 113 | |
| 114 | TEST_F(FirewallControllerTest, TestSetStandbyRule) { |
| 115 | ExpectedIptablesCommands expected = { |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 116 | { V4V6, "*filter\n-D fw_standby -m owner --uid-owner 12345 -j DROP\nCOMMIT\n" } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 117 | }; |
| 118 | mFw.setUidRule(STANDBY, 12345, ALLOW); |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 119 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 120 | |
| 121 | expected = { |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 122 | { V4V6, "*filter\n-A fw_standby -m owner --uid-owner 12345 -j DROP\nCOMMIT\n" } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 123 | }; |
| 124 | mFw.setUidRule(STANDBY, 12345, DENY); |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 125 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 126 | } |
| 127 | |
| 128 | TEST_F(FirewallControllerTest, TestSetDozeRule) { |
| 129 | ExpectedIptablesCommands expected = { |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 130 | { V4V6, "*filter\n-I fw_dozable -m owner --uid-owner 54321 -j RETURN\nCOMMIT\n" } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 131 | }; |
| 132 | mFw.setUidRule(DOZABLE, 54321, ALLOW); |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 133 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 134 | |
| 135 | expected = { |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 136 | { V4V6, "*filter\n-D fw_dozable -m owner --uid-owner 54321 -j RETURN\nCOMMIT\n" } |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 137 | }; |
| 138 | mFw.setUidRule(DOZABLE, 54321, DENY); |
Lorenzo Colitti | a735765 | 2017-04-25 00:16:36 +0900 | [diff] [blame] | 139 | expectIptablesRestoreCommands(expected); |
| 140 | } |
| 141 | |
| 142 | TEST_F(FirewallControllerTest, TestSetFirewallRule) { |
| 143 | ExpectedIptablesCommands expected = { |
| 144 | { V4V6, "*filter\n" |
| 145 | "-A fw_INPUT -m owner --uid-owner 54321 -j DROP\n" |
| 146 | "-A fw_OUTPUT -m owner --uid-owner 54321 -j DROP\n" |
| 147 | "COMMIT\n" } |
| 148 | }; |
| 149 | mFw.setUidRule(NONE, 54321, DENY); |
| 150 | expectIptablesRestoreCommands(expected); |
| 151 | |
| 152 | expected = { |
| 153 | { V4V6, "*filter\n" |
| 154 | "-D fw_INPUT -m owner --uid-owner 54321 -j DROP\n" |
| 155 | "-D fw_OUTPUT -m owner --uid-owner 54321 -j DROP\n" |
| 156 | "COMMIT\n" } |
| 157 | }; |
| 158 | mFw.setUidRule(NONE, 54321, ALLOW); |
| 159 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | 932c44c | 2016-04-24 16:58:02 +0900 | [diff] [blame] | 160 | } |
| 161 | |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 162 | TEST_F(FirewallControllerTest, TestReplaceAllowlistUidRule) { |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 163 | std::string expected = |
| 164 | "*filter\n" |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 165 | ":FW_allowchain -\n" |
| 166 | "-A FW_allowchain -m owner --uid-owner 10023 -j RETURN\n" |
| 167 | "-A FW_allowchain -m owner --uid-owner 10059 -j RETURN\n" |
| 168 | "-A FW_allowchain -m owner --uid-owner 10124 -j RETURN\n" |
| 169 | "-A FW_allowchain -m owner --uid-owner 10111 -j RETURN\n" |
| 170 | "-A FW_allowchain -m owner --uid-owner 110122 -j RETURN\n" |
| 171 | "-A FW_allowchain -m owner --uid-owner 210153 -j RETURN\n" |
| 172 | "-A FW_allowchain -m owner --uid-owner 210024 -j RETURN\n" |
| 173 | "-A FW_allowchain -m owner --uid-owner 0-9999 -j RETURN\n" |
| 174 | "-A FW_allowchain -m owner ! --uid-owner 0-4294967294 -j RETURN\n" |
| 175 | "-A FW_allowchain -p esp -j RETURN\n" |
| 176 | "-A FW_allowchain -i lo -j RETURN\n" |
| 177 | "-A FW_allowchain -o lo -j RETURN\n" |
| 178 | "-A FW_allowchain -p tcp --tcp-flags RST RST -j RETURN\n" |
| 179 | "-A FW_allowchain -p icmpv6 --icmpv6-type packet-too-big -j RETURN\n" |
| 180 | "-A FW_allowchain -p icmpv6 --icmpv6-type router-solicitation -j RETURN\n" |
| 181 | "-A FW_allowchain -p icmpv6 --icmpv6-type router-advertisement -j RETURN\n" |
| 182 | "-A FW_allowchain -p icmpv6 --icmpv6-type neighbour-solicitation -j RETURN\n" |
| 183 | "-A FW_allowchain -p icmpv6 --icmpv6-type neighbour-advertisement -j RETURN\n" |
| 184 | "-A FW_allowchain -p icmpv6 --icmpv6-type redirect -j RETURN\n" |
| 185 | "-A FW_allowchain -j DROP\n" |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 186 | "COMMIT\n"; |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 187 | |
| 188 | std::vector<int32_t> uids = { 10023, 10059, 10124, 10111, 110122, 210153, 210024 }; |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 189 | EXPECT_EQ(expected, makeUidRules(V6, "FW_allowchain", true, uids)); |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 190 | } |
| 191 | |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 192 | TEST_F(FirewallControllerTest, TestReplaceDenylistUidRule) { |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 193 | std::string expected = |
| 194 | "*filter\n" |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 195 | ":FW_denychain -\n" |
| 196 | "-A FW_denychain -i lo -j RETURN\n" |
| 197 | "-A FW_denychain -o lo -j RETURN\n" |
| 198 | "-A FW_denychain -p tcp --tcp-flags RST RST -j RETURN\n" |
| 199 | "-A FW_denychain -m owner --uid-owner 10023 -j DROP\n" |
| 200 | "-A FW_denychain -m owner --uid-owner 10059 -j DROP\n" |
| 201 | "-A FW_denychain -m owner --uid-owner 10124 -j DROP\n" |
Lorenzo Colitti | 03b23fe | 2017-02-03 18:46:53 +0900 | [diff] [blame] | 202 | "COMMIT\n"; |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 203 | |
| 204 | std::vector<int32_t> uids = { 10023, 10059, 10124 }; |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 205 | EXPECT_EQ(expected, makeUidRules(V4, "FW_denychain", false, uids)); |
Lorenzo Colitti | 89faa34 | 2016-02-26 11:38:47 +0900 | [diff] [blame] | 206 | } |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 207 | |
| 208 | TEST_F(FirewallControllerTest, TestEnableChildChains) { |
| 209 | std::vector<std::string> expected = { |
Lorenzo Colitti | a161196 | 2017-04-26 16:30:39 +0900 | [diff] [blame] | 210 | "*filter\n" |
| 211 | "-A fw_INPUT -j fw_dozable\n" |
| 212 | "-A fw_OUTPUT -j fw_dozable\n" |
| 213 | "COMMIT\n" |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 214 | }; |
| 215 | EXPECT_EQ(0, mFw.enableChildChains(DOZABLE, true)); |
Lorenzo Colitti | a161196 | 2017-04-26 16:30:39 +0900 | [diff] [blame] | 216 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 217 | |
| 218 | expected = { |
Lorenzo Colitti | a161196 | 2017-04-26 16:30:39 +0900 | [diff] [blame] | 219 | "*filter\n" |
| 220 | "-D fw_INPUT -j fw_powersave\n" |
| 221 | "-D fw_OUTPUT -j fw_powersave\n" |
| 222 | "COMMIT\n" |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 223 | }; |
| 224 | EXPECT_EQ(0, mFw.enableChildChains(POWERSAVE, false)); |
Lorenzo Colitti | a161196 | 2017-04-26 16:30:39 +0900 | [diff] [blame] | 225 | expectIptablesRestoreCommands(expected); |
Lorenzo Colitti | dd9a54b | 2017-04-26 16:13:22 +0900 | [diff] [blame] | 226 | } |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 227 | |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 228 | TEST_F(FirewallControllerTest, TestFirewall) { |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 229 | std::vector<std::string> enableCommands = { |
Maciej Żenczykowski | 350dbdb | 2021-10-14 20:22:23 -0700 | [diff] [blame] | 230 | "*filter\n" |
| 231 | "-A fw_INPUT -j DROP\n" |
| 232 | "-A fw_OUTPUT -j REJECT\n" |
| 233 | "-A fw_FORWARD -j REJECT\n" |
| 234 | "COMMIT\n"}; |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 235 | std::vector<std::string> disableCommands = { |
Maciej Żenczykowski | 350dbdb | 2021-10-14 20:22:23 -0700 | [diff] [blame] | 236 | "*filter\n" |
| 237 | ":fw_INPUT -\n" |
| 238 | ":fw_OUTPUT -\n" |
| 239 | ":fw_FORWARD -\n" |
| 240 | "-6 -A fw_OUTPUT ! -o lo -s ::1 -j DROP\n" |
| 241 | "COMMIT\n"}; |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 242 | std::vector<std::string> noCommands = {}; |
| 243 | |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame] | 244 | EXPECT_EQ(0, mFw.resetFirewall()); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 245 | expectIptablesRestoreCommands(disableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 246 | |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame] | 247 | EXPECT_EQ(0, mFw.resetFirewall()); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 248 | expectIptablesRestoreCommands(disableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 249 | |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 250 | EXPECT_EQ(0, mFw.setFirewallType(DENYLIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 251 | expectIptablesRestoreCommands(disableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 252 | |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 253 | EXPECT_EQ(0, mFw.setFirewallType(DENYLIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 254 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 255 | |
| 256 | std::vector<std::string> disableEnableCommands; |
| 257 | disableEnableCommands.insert( |
| 258 | disableEnableCommands.end(), disableCommands.begin(), disableCommands.end()); |
| 259 | disableEnableCommands.insert( |
| 260 | disableEnableCommands.end(), enableCommands.begin(), enableCommands.end()); |
| 261 | |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 262 | EXPECT_EQ(0, mFw.setFirewallType(ALLOWLIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 263 | expectIptablesRestoreCommands(disableEnableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 264 | |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 265 | std::vector<std::string> ifaceCommands = { |
Lorenzo Colitti | 1411d45 | 2017-07-17 22:12:15 +0900 | [diff] [blame] | 266 | "*filter\n" |
| 267 | "-I fw_INPUT -i rmnet_data0 -j RETURN\n" |
| 268 | "-I fw_OUTPUT -o rmnet_data0 -j RETURN\n" |
| 269 | "COMMIT\n" |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 270 | }; |
| 271 | EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); |
Lorenzo Colitti | 1411d45 | 2017-07-17 22:12:15 +0900 | [diff] [blame] | 272 | expectIptablesRestoreCommands(ifaceCommands); |
| 273 | |
| 274 | EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); |
| 275 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 276 | |
| 277 | ifaceCommands = { |
Lorenzo Colitti | 1411d45 | 2017-07-17 22:12:15 +0900 | [diff] [blame] | 278 | "*filter\n" |
| 279 | "-D fw_INPUT -i rmnet_data0 -j RETURN\n" |
| 280 | "-D fw_OUTPUT -o rmnet_data0 -j RETURN\n" |
| 281 | "COMMIT\n" |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 282 | }; |
| 283 | EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", DENY)); |
Lorenzo Colitti | 1411d45 | 2017-07-17 22:12:15 +0900 | [diff] [blame] | 284 | expectIptablesRestoreCommands(ifaceCommands); |
| 285 | |
| 286 | EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", DENY)); |
| 287 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | 6324b18 | 2017-07-17 21:48:14 +0900 | [diff] [blame] | 288 | |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 289 | EXPECT_EQ(0, mFw.setFirewallType(ALLOWLIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 290 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 291 | |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame] | 292 | EXPECT_EQ(0, mFw.resetFirewall()); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 293 | expectIptablesRestoreCommands(disableCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 294 | |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 295 | // TODO: calling resetFirewall and then setFirewallType(ALLOWLIST) does |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 296 | // nothing. This seems like a clear bug. |
Lorenzo Colitti | cdd79f1 | 2020-07-30 12:03:40 +0900 | [diff] [blame] | 297 | EXPECT_EQ(0, mFw.setFirewallType(ALLOWLIST)); |
Lorenzo Colitti | d351bea | 2017-07-16 22:52:30 +0900 | [diff] [blame] | 298 | expectIptablesRestoreCommands(noCommands); |
Lorenzo Colitti | cc1bb82 | 2017-07-16 21:08:54 +0900 | [diff] [blame] | 299 | } |
Hugo Benichi | 528d3d0 | 2018-06-20 13:35:58 +0900 | [diff] [blame] | 300 | |
| 301 | TEST_F(FirewallControllerTest, TestDiscoverMaximumValidUid) { |
| 302 | struct { |
| 303 | const std::string description; |
| 304 | const std::string content; |
| 305 | const uint32_t expected; |
| 306 | } testCases[] = { |
| 307 | { |
| 308 | .description = "root namespace case", |
| 309 | .content = " 0 0 4294967295", |
| 310 | .expected = 4294967294, |
| 311 | }, |
| 312 | { |
| 313 | .description = "container namespace case", |
| 314 | .content = " 0 655360 5000\n" |
| 315 | " 5000 600 50\n" |
| 316 | " 5050 660410 1994950\n", |
| 317 | .expected = 1999999, |
| 318 | }, |
| 319 | { |
| 320 | .description = "garbage content case", |
| 321 | .content = "garbage", |
| 322 | .expected = 4294967294, |
| 323 | }, |
| 324 | { |
| 325 | .description = "no content case", |
| 326 | .content = "", |
| 327 | .expected = 4294967294, |
| 328 | }, |
| 329 | }; |
| 330 | |
| 331 | const std::string tempFile = "/data/local/tmp/fake_uid_mapping"; |
| 332 | |
| 333 | for (const auto& test : testCases) { |
| 334 | EXPECT_TRUE(WriteStringToFile(test.content, tempFile, false)); |
| 335 | uint32_t got = FirewallController::discoverMaximumValidUid(tempFile); |
| 336 | EXPECT_EQ(0, remove(tempFile.c_str())); |
| 337 | if (got != test.expected) { |
| 338 | FAIL() << test.description << ":\n" |
| 339 | << test.content << "\ngot " << got << ", but expected " << test.expected; |
| 340 | } |
| 341 | } |
| 342 | |
| 343 | // Also check when the file is not defined |
| 344 | EXPECT_NE(0, access(tempFile.c_str(), F_OK)); |
| 345 | EXPECT_EQ(4294967294, FirewallController::discoverMaximumValidUid(tempFile)); |
| 346 | } |
Luke Huang | e64fa38 | 2018-07-24 16:38:22 +0800 | [diff] [blame] | 347 | |
| 348 | } // namespace net |
Bernie Innocenti | a5161a0 | 2019-01-30 22:40:53 +0900 | [diff] [blame] | 349 | } // namespace android |