Update VPN capabilities when its underlying network set is null.
Previously, they were only updated when underlying network set was non-null. This change also ensures that all the calls b/w ConnectivityService and Vpn that leads to updating capabilities are on ConnectivityService handler thread. Additionally, it also ensures that capabilities are propagated after VPN enters connected state. This was previously done from establish which could potentially lead to race between VPN getting connected and capabilities getting updated. This change also updates VPN capabilities inline from ConnectivityService handler thread. Previously, there was an additional loop where Vpn would update capabilities via NetworkAgent thru AsyncChannel which posts back to CS handler thread, which could potentially lead to delays in updating VPN capabilities. Bug: 119129310 Bug: 118856062 Bug: 124268198 Test: atest FrameworksNetTests Test: manual - verified VPNs capabilities are getting updated and DownloadManager is working correctly. Change-Id: Id0abc4d304bb096e92479a118168690ccce634ed
This commit is contained in:
@@ -917,7 +917,8 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
|||||||
|
|
||||||
mPermissionMonitor = new PermissionMonitor(mContext, mNMS);
|
mPermissionMonitor = new PermissionMonitor(mContext, mNMS);
|
||||||
|
|
||||||
//set up the listener for user state for creating user VPNs
|
// Set up the listener for user state for creating user VPNs.
|
||||||
|
// Should run on mHandler to avoid any races.
|
||||||
IntentFilter intentFilter = new IntentFilter();
|
IntentFilter intentFilter = new IntentFilter();
|
||||||
intentFilter.addAction(Intent.ACTION_USER_STARTED);
|
intentFilter.addAction(Intent.ACTION_USER_STARTED);
|
||||||
intentFilter.addAction(Intent.ACTION_USER_STOPPED);
|
intentFilter.addAction(Intent.ACTION_USER_STOPPED);
|
||||||
@@ -925,7 +926,11 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
|||||||
intentFilter.addAction(Intent.ACTION_USER_REMOVED);
|
intentFilter.addAction(Intent.ACTION_USER_REMOVED);
|
||||||
intentFilter.addAction(Intent.ACTION_USER_UNLOCKED);
|
intentFilter.addAction(Intent.ACTION_USER_UNLOCKED);
|
||||||
mContext.registerReceiverAsUser(
|
mContext.registerReceiverAsUser(
|
||||||
mIntentReceiver, UserHandle.ALL, intentFilter, null, null);
|
mIntentReceiver,
|
||||||
|
UserHandle.ALL,
|
||||||
|
intentFilter,
|
||||||
|
null /* broadcastPermission */,
|
||||||
|
mHandler);
|
||||||
mContext.registerReceiverAsUser(mUserPresentReceiver, UserHandle.SYSTEM,
|
mContext.registerReceiverAsUser(mUserPresentReceiver, UserHandle.SYSTEM,
|
||||||
new IntentFilter(Intent.ACTION_USER_PRESENT), null, null);
|
new IntentFilter(Intent.ACTION_USER_PRESENT), null, null);
|
||||||
|
|
||||||
@@ -936,7 +941,11 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
|||||||
intentFilter.addAction(Intent.ACTION_PACKAGE_REMOVED);
|
intentFilter.addAction(Intent.ACTION_PACKAGE_REMOVED);
|
||||||
intentFilter.addDataScheme("package");
|
intentFilter.addDataScheme("package");
|
||||||
mContext.registerReceiverAsUser(
|
mContext.registerReceiverAsUser(
|
||||||
mIntentReceiver, UserHandle.ALL, intentFilter, null, null);
|
mIntentReceiver,
|
||||||
|
UserHandle.ALL,
|
||||||
|
intentFilter,
|
||||||
|
null /* broadcastPermission */,
|
||||||
|
mHandler);
|
||||||
|
|
||||||
try {
|
try {
|
||||||
mNMS.registerObserver(mTethering);
|
mNMS.registerObserver(mTethering);
|
||||||
@@ -4088,17 +4097,27 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
|||||||
* handler thread through their agent, this is asynchronous. When the capabilities objects
|
* handler thread through their agent, this is asynchronous. When the capabilities objects
|
||||||
* are computed they will be up-to-date as they are computed synchronously from here and
|
* are computed they will be up-to-date as they are computed synchronously from here and
|
||||||
* this is running on the ConnectivityService thread.
|
* this is running on the ConnectivityService thread.
|
||||||
* TODO : Fix this and call updateCapabilities inline to remove out-of-order events.
|
|
||||||
*/
|
*/
|
||||||
private void updateAllVpnsCapabilities() {
|
private void updateAllVpnsCapabilities() {
|
||||||
|
Network defaultNetwork = getNetwork(getDefaultNetwork());
|
||||||
synchronized (mVpns) {
|
synchronized (mVpns) {
|
||||||
for (int i = 0; i < mVpns.size(); i++) {
|
for (int i = 0; i < mVpns.size(); i++) {
|
||||||
final Vpn vpn = mVpns.valueAt(i);
|
final Vpn vpn = mVpns.valueAt(i);
|
||||||
vpn.updateCapabilities();
|
NetworkCapabilities nc = vpn.updateCapabilities(defaultNetwork);
|
||||||
|
updateVpnCapabilities(vpn, nc);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private void updateVpnCapabilities(Vpn vpn, @Nullable NetworkCapabilities nc) {
|
||||||
|
ensureRunningOnConnectivityServiceThread();
|
||||||
|
NetworkAgentInfo vpnNai = getNetworkAgentInfoForNetId(vpn.getNetId());
|
||||||
|
if (vpnNai == null || nc == null) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
updateCapabilities(vpnNai.getCurrentScore(), vpnNai, nc);
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean updateLockdownVpn() {
|
public boolean updateLockdownVpn() {
|
||||||
if (Binder.getCallingUid() != Process.SYSTEM_UID) {
|
if (Binder.getCallingUid() != Process.SYSTEM_UID) {
|
||||||
@@ -4439,22 +4458,28 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
|||||||
|
|
||||||
private void onUserAdded(int userId) {
|
private void onUserAdded(int userId) {
|
||||||
mPermissionMonitor.onUserAdded(userId);
|
mPermissionMonitor.onUserAdded(userId);
|
||||||
|
Network defaultNetwork = getNetwork(getDefaultNetwork());
|
||||||
synchronized (mVpns) {
|
synchronized (mVpns) {
|
||||||
final int vpnsSize = mVpns.size();
|
final int vpnsSize = mVpns.size();
|
||||||
for (int i = 0; i < vpnsSize; i++) {
|
for (int i = 0; i < vpnsSize; i++) {
|
||||||
Vpn vpn = mVpns.valueAt(i);
|
Vpn vpn = mVpns.valueAt(i);
|
||||||
vpn.onUserAdded(userId);
|
vpn.onUserAdded(userId);
|
||||||
|
NetworkCapabilities nc = vpn.updateCapabilities(defaultNetwork);
|
||||||
|
updateVpnCapabilities(vpn, nc);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private void onUserRemoved(int userId) {
|
private void onUserRemoved(int userId) {
|
||||||
mPermissionMonitor.onUserRemoved(userId);
|
mPermissionMonitor.onUserRemoved(userId);
|
||||||
|
Network defaultNetwork = getNetwork(getDefaultNetwork());
|
||||||
synchronized (mVpns) {
|
synchronized (mVpns) {
|
||||||
final int vpnsSize = mVpns.size();
|
final int vpnsSize = mVpns.size();
|
||||||
for (int i = 0; i < vpnsSize; i++) {
|
for (int i = 0; i < vpnsSize; i++) {
|
||||||
Vpn vpn = mVpns.valueAt(i);
|
Vpn vpn = mVpns.valueAt(i);
|
||||||
vpn.onUserRemoved(userId);
|
vpn.onUserRemoved(userId);
|
||||||
|
NetworkCapabilities nc = vpn.updateCapabilities(defaultNetwork);
|
||||||
|
updateVpnCapabilities(vpn, nc);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -4523,6 +4548,7 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
|||||||
private BroadcastReceiver mIntentReceiver = new BroadcastReceiver() {
|
private BroadcastReceiver mIntentReceiver = new BroadcastReceiver() {
|
||||||
@Override
|
@Override
|
||||||
public void onReceive(Context context, Intent intent) {
|
public void onReceive(Context context, Intent intent) {
|
||||||
|
ensureRunningOnConnectivityServiceThread();
|
||||||
final String action = intent.getAction();
|
final String action = intent.getAction();
|
||||||
final int userId = intent.getIntExtra(Intent.EXTRA_USER_HANDLE, UserHandle.USER_NULL);
|
final int userId = intent.getIntExtra(Intent.EXTRA_USER_HANDLE, UserHandle.USER_NULL);
|
||||||
final int uid = intent.getIntExtra(Intent.EXTRA_UID, -1);
|
final int uid = intent.getIntExtra(Intent.EXTRA_UID, -1);
|
||||||
@@ -5027,6 +5053,19 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
|||||||
return getNetworkForRequest(mDefaultRequest.requestId);
|
return getNetworkForRequest(mDefaultRequest.requestId);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Nullable
|
||||||
|
private Network getNetwork(@Nullable NetworkAgentInfo nai) {
|
||||||
|
return nai != null ? nai.network : null;
|
||||||
|
}
|
||||||
|
|
||||||
|
private void ensureRunningOnConnectivityServiceThread() {
|
||||||
|
if (mHandler.getLooper().getThread() != Thread.currentThread()) {
|
||||||
|
throw new IllegalStateException(
|
||||||
|
"Not running on ConnectivityService thread: "
|
||||||
|
+ Thread.currentThread().getName());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
private boolean isDefaultNetwork(NetworkAgentInfo nai) {
|
private boolean isDefaultNetwork(NetworkAgentInfo nai) {
|
||||||
return nai == getDefaultNetwork();
|
return nai == getDefaultNetwork();
|
||||||
}
|
}
|
||||||
@@ -5620,6 +5659,8 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
|||||||
updateTcpBufferSizes(newNetwork.linkProperties.getTcpBufferSizes());
|
updateTcpBufferSizes(newNetwork.linkProperties.getTcpBufferSizes());
|
||||||
mDnsManager.setDefaultDnsSystemProperties(newNetwork.linkProperties.getDnsServers());
|
mDnsManager.setDefaultDnsSystemProperties(newNetwork.linkProperties.getDnsServers());
|
||||||
notifyIfacesChangedForNetworkStats();
|
notifyIfacesChangedForNetworkStats();
|
||||||
|
// Fix up the NetworkCapabilities of any VPNs that don't specify underlying networks.
|
||||||
|
updateAllVpnsCapabilities();
|
||||||
}
|
}
|
||||||
|
|
||||||
private void processListenRequests(NetworkAgentInfo nai, boolean capabilitiesChanged) {
|
private void processListenRequests(NetworkAgentInfo nai, boolean capabilitiesChanged) {
|
||||||
@@ -6059,6 +6100,10 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
|||||||
// doing.
|
// doing.
|
||||||
updateSignalStrengthThresholds(networkAgent, "CONNECT", null);
|
updateSignalStrengthThresholds(networkAgent, "CONNECT", null);
|
||||||
|
|
||||||
|
if (networkAgent.isVPN()) {
|
||||||
|
updateAllVpnsCapabilities();
|
||||||
|
}
|
||||||
|
|
||||||
// Consider network even though it is not yet validated.
|
// Consider network even though it is not yet validated.
|
||||||
final long now = SystemClock.elapsedRealtime();
|
final long now = SystemClock.elapsedRealtime();
|
||||||
rematchNetworkAndRequests(networkAgent, ReapUnvalidatedNetworks.REAP, now);
|
rematchNetworkAndRequests(networkAgent, ReapUnvalidatedNetworks.REAP, now);
|
||||||
@@ -6320,7 +6365,11 @@ public class ConnectivityService extends IConnectivityManager.Stub
|
|||||||
success = mVpns.get(user).setUnderlyingNetworks(networks);
|
success = mVpns.get(user).setUnderlyingNetworks(networks);
|
||||||
}
|
}
|
||||||
if (success) {
|
if (success) {
|
||||||
mHandler.post(() -> notifyIfacesChangedForNetworkStats());
|
mHandler.post(() -> {
|
||||||
|
// Update VPN's capabilities based on updated underlying network set.
|
||||||
|
updateAllVpnsCapabilities();
|
||||||
|
notifyIfacesChangedForNetworkStats();
|
||||||
|
});
|
||||||
}
|
}
|
||||||
return success;
|
return success;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -20,6 +20,7 @@ import static android.net.ConnectivityManager.CONNECTIVITY_ACTION;
|
|||||||
import static android.net.ConnectivityManager.PRIVATE_DNS_MODE_OFF;
|
import static android.net.ConnectivityManager.PRIVATE_DNS_MODE_OFF;
|
||||||
import static android.net.ConnectivityManager.PRIVATE_DNS_MODE_OPPORTUNISTIC;
|
import static android.net.ConnectivityManager.PRIVATE_DNS_MODE_OPPORTUNISTIC;
|
||||||
import static android.net.ConnectivityManager.PRIVATE_DNS_MODE_PROVIDER_HOSTNAME;
|
import static android.net.ConnectivityManager.PRIVATE_DNS_MODE_PROVIDER_HOSTNAME;
|
||||||
|
import static android.net.ConnectivityManager.NETID_UNSET;
|
||||||
import static android.net.ConnectivityManager.TYPE_ETHERNET;
|
import static android.net.ConnectivityManager.TYPE_ETHERNET;
|
||||||
import static android.net.ConnectivityManager.TYPE_MOBILE;
|
import static android.net.ConnectivityManager.TYPE_MOBILE;
|
||||||
import static android.net.ConnectivityManager.TYPE_MOBILE_FOTA;
|
import static android.net.ConnectivityManager.TYPE_MOBILE_FOTA;
|
||||||
@@ -885,11 +886,14 @@ public class ConnectivityServiceTest {
|
|||||||
|
|
||||||
public void setUids(Set<UidRange> uids) {
|
public void setUids(Set<UidRange> uids) {
|
||||||
mNetworkCapabilities.setUids(uids);
|
mNetworkCapabilities.setUids(uids);
|
||||||
updateCapabilities();
|
updateCapabilities(null /* defaultNetwork */);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public int getNetId() {
|
public int getNetId() {
|
||||||
|
if (mMockNetworkAgent == null) {
|
||||||
|
return NETID_UNSET;
|
||||||
|
}
|
||||||
return mMockNetworkAgent.getNetwork().netId;
|
return mMockNetworkAgent.getNetwork().netId;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -911,12 +915,13 @@ public class ConnectivityServiceTest {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void updateCapabilities() {
|
public NetworkCapabilities updateCapabilities(Network defaultNetwork) {
|
||||||
if (!mConnected) return;
|
if (!mConnected) return null;
|
||||||
super.updateCapabilities();
|
super.updateCapabilities(defaultNetwork);
|
||||||
// Because super.updateCapabilities will update the capabilities of the agent but not
|
// Because super.updateCapabilities will update the capabilities of the agent but
|
||||||
// the mock agent, the mock agent needs to know about them.
|
// not the mock agent, the mock agent needs to know about them.
|
||||||
copyCapabilitiesToNetworkAgent();
|
copyCapabilitiesToNetworkAgent();
|
||||||
|
return new NetworkCapabilities(mNetworkCapabilities);
|
||||||
}
|
}
|
||||||
|
|
||||||
private void copyCapabilitiesToNetworkAgent() {
|
private void copyCapabilitiesToNetworkAgent() {
|
||||||
@@ -4660,6 +4665,7 @@ public class ConnectivityServiceTest {
|
|||||||
|
|
||||||
vpnNetworkAgent.connect(false);
|
vpnNetworkAgent.connect(false);
|
||||||
mMockVpn.connect();
|
mMockVpn.connect();
|
||||||
|
mMockVpn.setUnderlyingNetworks(new Network[0]);
|
||||||
|
|
||||||
genericNetworkCallback.expectAvailableCallbacksUnvalidated(vpnNetworkAgent);
|
genericNetworkCallback.expectAvailableCallbacksUnvalidated(vpnNetworkAgent);
|
||||||
genericNotVpnNetworkCallback.assertNoCallback();
|
genericNotVpnNetworkCallback.assertNoCallback();
|
||||||
@@ -4692,6 +4698,7 @@ public class ConnectivityServiceTest {
|
|||||||
|
|
||||||
ranges.add(new UidRange(uid, uid));
|
ranges.add(new UidRange(uid, uid));
|
||||||
mMockVpn.setUids(ranges);
|
mMockVpn.setUids(ranges);
|
||||||
|
vpnNetworkAgent.setUids(ranges);
|
||||||
|
|
||||||
genericNetworkCallback.expectAvailableCallbacksValidated(vpnNetworkAgent);
|
genericNetworkCallback.expectAvailableCallbacksValidated(vpnNetworkAgent);
|
||||||
genericNotVpnNetworkCallback.assertNoCallback();
|
genericNotVpnNetworkCallback.assertNoCallback();
|
||||||
@@ -4725,12 +4732,11 @@ public class ConnectivityServiceTest {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testVpnWithAndWithoutInternet() {
|
public void testVpnWithoutInternet() {
|
||||||
final int uid = Process.myUid();
|
final int uid = Process.myUid();
|
||||||
|
|
||||||
final TestNetworkCallback defaultCallback = new TestNetworkCallback();
|
final TestNetworkCallback defaultCallback = new TestNetworkCallback();
|
||||||
mCm.registerDefaultNetworkCallback(defaultCallback);
|
mCm.registerDefaultNetworkCallback(defaultCallback);
|
||||||
defaultCallback.assertNoCallback();
|
|
||||||
|
|
||||||
mWiFiNetworkAgent = new MockNetworkAgent(TRANSPORT_WIFI);
|
mWiFiNetworkAgent = new MockNetworkAgent(TRANSPORT_WIFI);
|
||||||
mWiFiNetworkAgent.connect(true);
|
mWiFiNetworkAgent.connect(true);
|
||||||
@@ -4752,11 +4758,30 @@ public class ConnectivityServiceTest {
|
|||||||
vpnNetworkAgent.disconnect();
|
vpnNetworkAgent.disconnect();
|
||||||
defaultCallback.assertNoCallback();
|
defaultCallback.assertNoCallback();
|
||||||
|
|
||||||
vpnNetworkAgent = new MockNetworkAgent(TRANSPORT_VPN);
|
mCm.unregisterNetworkCallback(defaultCallback);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testVpnWithInternet() {
|
||||||
|
final int uid = Process.myUid();
|
||||||
|
|
||||||
|
final TestNetworkCallback defaultCallback = new TestNetworkCallback();
|
||||||
|
mCm.registerDefaultNetworkCallback(defaultCallback);
|
||||||
|
|
||||||
|
mWiFiNetworkAgent = new MockNetworkAgent(TRANSPORT_WIFI);
|
||||||
|
mWiFiNetworkAgent.connect(true);
|
||||||
|
|
||||||
|
defaultCallback.expectAvailableThenValidatedCallbacks(mWiFiNetworkAgent);
|
||||||
|
assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork());
|
||||||
|
|
||||||
|
MockNetworkAgent vpnNetworkAgent = new MockNetworkAgent(TRANSPORT_VPN);
|
||||||
|
final ArraySet<UidRange> ranges = new ArraySet<>();
|
||||||
|
ranges.add(new UidRange(uid, uid));
|
||||||
mMockVpn.setNetworkAgent(vpnNetworkAgent);
|
mMockVpn.setNetworkAgent(vpnNetworkAgent);
|
||||||
mMockVpn.setUids(ranges);
|
mMockVpn.setUids(ranges);
|
||||||
vpnNetworkAgent.connect(true /* validated */, true /* hasInternet */);
|
vpnNetworkAgent.connect(true /* validated */, true /* hasInternet */);
|
||||||
mMockVpn.connect();
|
mMockVpn.connect();
|
||||||
|
|
||||||
defaultCallback.expectAvailableThenValidatedCallbacks(vpnNetworkAgent);
|
defaultCallback.expectAvailableThenValidatedCallbacks(vpnNetworkAgent);
|
||||||
assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork());
|
assertEquals(defaultCallback.getLastAvailableNetwork(), mCm.getActiveNetwork());
|
||||||
|
|
||||||
@@ -4764,14 +4789,6 @@ public class ConnectivityServiceTest {
|
|||||||
defaultCallback.expectCallback(CallbackState.LOST, vpnNetworkAgent);
|
defaultCallback.expectCallback(CallbackState.LOST, vpnNetworkAgent);
|
||||||
defaultCallback.expectAvailableCallbacksValidated(mWiFiNetworkAgent);
|
defaultCallback.expectAvailableCallbacksValidated(mWiFiNetworkAgent);
|
||||||
|
|
||||||
vpnNetworkAgent = new MockNetworkAgent(TRANSPORT_VPN);
|
|
||||||
ranges.clear();
|
|
||||||
mMockVpn.setNetworkAgent(vpnNetworkAgent);
|
|
||||||
mMockVpn.setUids(ranges);
|
|
||||||
vpnNetworkAgent.connect(false /* validated */, true /* hasInternet */);
|
|
||||||
mMockVpn.connect();
|
|
||||||
defaultCallback.assertNoCallback();
|
|
||||||
|
|
||||||
mCm.unregisterNetworkCallback(defaultCallback);
|
mCm.unregisterNetworkCallback(defaultCallback);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -4873,6 +4890,70 @@ public class ConnectivityServiceTest {
|
|||||||
mMockVpn.disconnect();
|
mMockVpn.disconnect();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testNullUnderlyingNetworks() {
|
||||||
|
final int uid = Process.myUid();
|
||||||
|
|
||||||
|
final TestNetworkCallback vpnNetworkCallback = new TestNetworkCallback();
|
||||||
|
final NetworkRequest vpnNetworkRequest = new NetworkRequest.Builder()
|
||||||
|
.removeCapability(NET_CAPABILITY_NOT_VPN)
|
||||||
|
.addTransportType(TRANSPORT_VPN)
|
||||||
|
.build();
|
||||||
|
NetworkCapabilities nc;
|
||||||
|
mCm.registerNetworkCallback(vpnNetworkRequest, vpnNetworkCallback);
|
||||||
|
vpnNetworkCallback.assertNoCallback();
|
||||||
|
|
||||||
|
final MockNetworkAgent vpnNetworkAgent = new MockNetworkAgent(TRANSPORT_VPN);
|
||||||
|
final ArraySet<UidRange> ranges = new ArraySet<>();
|
||||||
|
ranges.add(new UidRange(uid, uid));
|
||||||
|
mMockVpn.setNetworkAgent(vpnNetworkAgent);
|
||||||
|
mMockVpn.connect();
|
||||||
|
mMockVpn.setUids(ranges);
|
||||||
|
vpnNetworkAgent.connect(true /* validated */, false /* hasInternet */);
|
||||||
|
|
||||||
|
vpnNetworkCallback.expectAvailableThenValidatedCallbacks(vpnNetworkAgent);
|
||||||
|
nc = mCm.getNetworkCapabilities(vpnNetworkAgent.getNetwork());
|
||||||
|
assertTrue(nc.hasTransport(TRANSPORT_VPN));
|
||||||
|
assertFalse(nc.hasTransport(TRANSPORT_CELLULAR));
|
||||||
|
assertFalse(nc.hasTransport(TRANSPORT_WIFI));
|
||||||
|
// By default, VPN is set to track default network (i.e. its underlying networks is null).
|
||||||
|
// In case of no default network, VPN is considered metered.
|
||||||
|
assertFalse(nc.hasCapability(NET_CAPABILITY_NOT_METERED));
|
||||||
|
|
||||||
|
// Connect to Cell; Cell is the default network.
|
||||||
|
mCellNetworkAgent = new MockNetworkAgent(TRANSPORT_CELLULAR);
|
||||||
|
mCellNetworkAgent.connect(true);
|
||||||
|
|
||||||
|
vpnNetworkCallback.expectCapabilitiesLike((caps) -> caps.hasTransport(TRANSPORT_VPN)
|
||||||
|
&& caps.hasTransport(TRANSPORT_CELLULAR) && !caps.hasTransport(TRANSPORT_WIFI)
|
||||||
|
&& !caps.hasCapability(NET_CAPABILITY_NOT_METERED),
|
||||||
|
vpnNetworkAgent);
|
||||||
|
|
||||||
|
// Connect to WiFi; WiFi is the new default.
|
||||||
|
mWiFiNetworkAgent = new MockNetworkAgent(TRANSPORT_WIFI);
|
||||||
|
mWiFiNetworkAgent.addCapability(NET_CAPABILITY_NOT_METERED);
|
||||||
|
mWiFiNetworkAgent.connect(true);
|
||||||
|
|
||||||
|
vpnNetworkCallback.expectCapabilitiesLike((caps) -> caps.hasTransport(TRANSPORT_VPN)
|
||||||
|
&& !caps.hasTransport(TRANSPORT_CELLULAR) && caps.hasTransport(TRANSPORT_WIFI)
|
||||||
|
&& caps.hasCapability(NET_CAPABILITY_NOT_METERED),
|
||||||
|
vpnNetworkAgent);
|
||||||
|
|
||||||
|
// Disconnect Cell. The default network did not change, so there shouldn't be any changes in
|
||||||
|
// the capabilities.
|
||||||
|
mCellNetworkAgent.disconnect();
|
||||||
|
|
||||||
|
// Disconnect wifi too. Now we have no default network.
|
||||||
|
mWiFiNetworkAgent.disconnect();
|
||||||
|
|
||||||
|
vpnNetworkCallback.expectCapabilitiesLike((caps) -> caps.hasTransport(TRANSPORT_VPN)
|
||||||
|
&& !caps.hasTransport(TRANSPORT_CELLULAR) && !caps.hasTransport(TRANSPORT_WIFI)
|
||||||
|
&& !caps.hasCapability(NET_CAPABILITY_NOT_METERED),
|
||||||
|
vpnNetworkAgent);
|
||||||
|
|
||||||
|
mMockVpn.disconnect();
|
||||||
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void testNetworkBlockedStatus() {
|
public void testNetworkBlockedStatus() {
|
||||||
final TestNetworkCallback cellNetworkCallback = new TestNetworkCallback();
|
final TestNetworkCallback cellNetworkCallback = new TestNetworkCallback();
|
||||||
|
|||||||
@@ -566,7 +566,7 @@ public class VpnTest {
|
|||||||
|
|
||||||
final NetworkCapabilities caps = new NetworkCapabilities();
|
final NetworkCapabilities caps = new NetworkCapabilities();
|
||||||
|
|
||||||
Vpn.updateCapabilities(
|
Vpn.applyUnderlyingCapabilities(
|
||||||
mConnectivityManager, new Network[] {}, caps, false /* isAlwaysMetered */);
|
mConnectivityManager, new Network[] {}, caps, false /* isAlwaysMetered */);
|
||||||
assertTrue(caps.hasTransport(TRANSPORT_VPN));
|
assertTrue(caps.hasTransport(TRANSPORT_VPN));
|
||||||
assertFalse(caps.hasTransport(TRANSPORT_CELLULAR));
|
assertFalse(caps.hasTransport(TRANSPORT_CELLULAR));
|
||||||
@@ -577,7 +577,7 @@ public class VpnTest {
|
|||||||
assertTrue(caps.hasCapability(NET_CAPABILITY_NOT_ROAMING));
|
assertTrue(caps.hasCapability(NET_CAPABILITY_NOT_ROAMING));
|
||||||
assertTrue(caps.hasCapability(NET_CAPABILITY_NOT_CONGESTED));
|
assertTrue(caps.hasCapability(NET_CAPABILITY_NOT_CONGESTED));
|
||||||
|
|
||||||
Vpn.updateCapabilities(
|
Vpn.applyUnderlyingCapabilities(
|
||||||
mConnectivityManager,
|
mConnectivityManager,
|
||||||
new Network[] {mobile},
|
new Network[] {mobile},
|
||||||
caps,
|
caps,
|
||||||
@@ -591,7 +591,7 @@ public class VpnTest {
|
|||||||
assertFalse(caps.hasCapability(NET_CAPABILITY_NOT_ROAMING));
|
assertFalse(caps.hasCapability(NET_CAPABILITY_NOT_ROAMING));
|
||||||
assertTrue(caps.hasCapability(NET_CAPABILITY_NOT_CONGESTED));
|
assertTrue(caps.hasCapability(NET_CAPABILITY_NOT_CONGESTED));
|
||||||
|
|
||||||
Vpn.updateCapabilities(
|
Vpn.applyUnderlyingCapabilities(
|
||||||
mConnectivityManager, new Network[] {wifi}, caps, false /* isAlwaysMetered */);
|
mConnectivityManager, new Network[] {wifi}, caps, false /* isAlwaysMetered */);
|
||||||
assertTrue(caps.hasTransport(TRANSPORT_VPN));
|
assertTrue(caps.hasTransport(TRANSPORT_VPN));
|
||||||
assertFalse(caps.hasTransport(TRANSPORT_CELLULAR));
|
assertFalse(caps.hasTransport(TRANSPORT_CELLULAR));
|
||||||
@@ -602,7 +602,7 @@ public class VpnTest {
|
|||||||
assertTrue(caps.hasCapability(NET_CAPABILITY_NOT_ROAMING));
|
assertTrue(caps.hasCapability(NET_CAPABILITY_NOT_ROAMING));
|
||||||
assertTrue(caps.hasCapability(NET_CAPABILITY_NOT_CONGESTED));
|
assertTrue(caps.hasCapability(NET_CAPABILITY_NOT_CONGESTED));
|
||||||
|
|
||||||
Vpn.updateCapabilities(
|
Vpn.applyUnderlyingCapabilities(
|
||||||
mConnectivityManager, new Network[] {wifi}, caps, true /* isAlwaysMetered */);
|
mConnectivityManager, new Network[] {wifi}, caps, true /* isAlwaysMetered */);
|
||||||
assertTrue(caps.hasTransport(TRANSPORT_VPN));
|
assertTrue(caps.hasTransport(TRANSPORT_VPN));
|
||||||
assertFalse(caps.hasTransport(TRANSPORT_CELLULAR));
|
assertFalse(caps.hasTransport(TRANSPORT_CELLULAR));
|
||||||
@@ -613,7 +613,7 @@ public class VpnTest {
|
|||||||
assertTrue(caps.hasCapability(NET_CAPABILITY_NOT_ROAMING));
|
assertTrue(caps.hasCapability(NET_CAPABILITY_NOT_ROAMING));
|
||||||
assertTrue(caps.hasCapability(NET_CAPABILITY_NOT_CONGESTED));
|
assertTrue(caps.hasCapability(NET_CAPABILITY_NOT_CONGESTED));
|
||||||
|
|
||||||
Vpn.updateCapabilities(
|
Vpn.applyUnderlyingCapabilities(
|
||||||
mConnectivityManager,
|
mConnectivityManager,
|
||||||
new Network[] {mobile, wifi},
|
new Network[] {mobile, wifi},
|
||||||
caps,
|
caps,
|
||||||
|
|||||||
Reference in New Issue
Block a user