The tests are packaged together with other tests in a common coverage suite, so need to be individually annotated so that they are skipped before S. They do not need to pass on platforms older than S, because such platforms will not updated with the code that is tested. Bug: 187935317 Test: atest ConnectivityCoverageTests on R Change-Id: I10da45ae023e7f1e8cd11ec857b84346892a3fa8
309 lines
11 KiB
Java
309 lines
11 KiB
Java
/*
|
|
* Copyright (C) 2017 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package android.net;
|
|
|
|
import static android.system.OsConstants.AF_INET;
|
|
import static android.system.OsConstants.IPPROTO_UDP;
|
|
import static android.system.OsConstants.SOCK_DGRAM;
|
|
|
|
import static org.junit.Assert.assertEquals;
|
|
import static org.junit.Assert.assertNotNull;
|
|
import static org.junit.Assert.fail;
|
|
import static org.mockito.Matchers.anyInt;
|
|
import static org.mockito.Matchers.anyObject;
|
|
import static org.mockito.Matchers.anyString;
|
|
import static org.mockito.Matchers.eq;
|
|
import static org.mockito.Mockito.mock;
|
|
import static org.mockito.Mockito.verify;
|
|
import static org.mockito.Mockito.when;
|
|
|
|
import android.os.Build;
|
|
import android.system.Os;
|
|
import android.test.mock.MockContext;
|
|
|
|
import androidx.test.filters.SdkSuppress;
|
|
import androidx.test.filters.SmallTest;
|
|
import androidx.test.runner.AndroidJUnit4;
|
|
|
|
import com.android.server.IpSecService;
|
|
|
|
import org.junit.Before;
|
|
import org.junit.Test;
|
|
import org.junit.runner.RunWith;
|
|
|
|
import java.net.InetAddress;
|
|
import java.net.Socket;
|
|
import java.net.UnknownHostException;
|
|
|
|
/** Unit tests for {@link IpSecManager}. */
|
|
@SmallTest
|
|
@RunWith(AndroidJUnit4.class)
|
|
@SdkSuppress(minSdkVersion = Build.VERSION_CODES.S, codeName = "S")
|
|
public class IpSecManagerTest {
|
|
|
|
private static final int TEST_UDP_ENCAP_PORT = 34567;
|
|
private static final int DROID_SPI = 0xD1201D;
|
|
private static final int DUMMY_RESOURCE_ID = 0x1234;
|
|
|
|
private static final InetAddress GOOGLE_DNS_4;
|
|
private static final String VTI_INTF_NAME = "ipsec_test";
|
|
private static final InetAddress VTI_LOCAL_ADDRESS;
|
|
private static final LinkAddress VTI_INNER_ADDRESS = new LinkAddress("10.0.1.1/24");
|
|
|
|
static {
|
|
try {
|
|
// Google Public DNS Addresses;
|
|
GOOGLE_DNS_4 = InetAddress.getByName("8.8.8.8");
|
|
VTI_LOCAL_ADDRESS = InetAddress.getByName("8.8.4.4");
|
|
} catch (UnknownHostException e) {
|
|
throw new RuntimeException("Could not resolve DNS Addresses", e);
|
|
}
|
|
}
|
|
|
|
private IpSecService mMockIpSecService;
|
|
private IpSecManager mIpSecManager;
|
|
private MockContext mMockContext = new MockContext() {
|
|
@Override
|
|
public String getOpPackageName() {
|
|
return "fooPackage";
|
|
}
|
|
};
|
|
|
|
@Before
|
|
public void setUp() throws Exception {
|
|
mMockIpSecService = mock(IpSecService.class);
|
|
mIpSecManager = new IpSecManager(mMockContext, mMockIpSecService);
|
|
}
|
|
|
|
/*
|
|
* Allocate a specific SPI
|
|
* Close SPIs
|
|
*/
|
|
@Test
|
|
public void testAllocSpi() throws Exception {
|
|
IpSecSpiResponse spiResp =
|
|
new IpSecSpiResponse(IpSecManager.Status.OK, DUMMY_RESOURCE_ID, DROID_SPI);
|
|
when(mMockIpSecService.allocateSecurityParameterIndex(
|
|
eq(GOOGLE_DNS_4.getHostAddress()),
|
|
eq(DROID_SPI),
|
|
anyObject()))
|
|
.thenReturn(spiResp);
|
|
|
|
IpSecManager.SecurityParameterIndex droidSpi =
|
|
mIpSecManager.allocateSecurityParameterIndex(GOOGLE_DNS_4, DROID_SPI);
|
|
assertEquals(DROID_SPI, droidSpi.getSpi());
|
|
|
|
droidSpi.close();
|
|
|
|
verify(mMockIpSecService).releaseSecurityParameterIndex(DUMMY_RESOURCE_ID);
|
|
}
|
|
|
|
@Test
|
|
public void testAllocRandomSpi() throws Exception {
|
|
IpSecSpiResponse spiResp =
|
|
new IpSecSpiResponse(IpSecManager.Status.OK, DUMMY_RESOURCE_ID, DROID_SPI);
|
|
when(mMockIpSecService.allocateSecurityParameterIndex(
|
|
eq(GOOGLE_DNS_4.getHostAddress()),
|
|
eq(IpSecManager.INVALID_SECURITY_PARAMETER_INDEX),
|
|
anyObject()))
|
|
.thenReturn(spiResp);
|
|
|
|
IpSecManager.SecurityParameterIndex randomSpi =
|
|
mIpSecManager.allocateSecurityParameterIndex(GOOGLE_DNS_4);
|
|
|
|
assertEquals(DROID_SPI, randomSpi.getSpi());
|
|
|
|
randomSpi.close();
|
|
|
|
verify(mMockIpSecService).releaseSecurityParameterIndex(DUMMY_RESOURCE_ID);
|
|
}
|
|
|
|
/*
|
|
* Throws resource unavailable exception
|
|
*/
|
|
@Test
|
|
public void testAllocSpiResUnavailableException() throws Exception {
|
|
IpSecSpiResponse spiResp =
|
|
new IpSecSpiResponse(IpSecManager.Status.RESOURCE_UNAVAILABLE, 0, 0);
|
|
when(mMockIpSecService.allocateSecurityParameterIndex(
|
|
anyString(), anyInt(), anyObject()))
|
|
.thenReturn(spiResp);
|
|
|
|
try {
|
|
mIpSecManager.allocateSecurityParameterIndex(GOOGLE_DNS_4);
|
|
fail("ResourceUnavailableException was not thrown");
|
|
} catch (IpSecManager.ResourceUnavailableException e) {
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Throws spi unavailable exception
|
|
*/
|
|
@Test
|
|
public void testAllocSpiSpiUnavailableException() throws Exception {
|
|
IpSecSpiResponse spiResp = new IpSecSpiResponse(IpSecManager.Status.SPI_UNAVAILABLE, 0, 0);
|
|
when(mMockIpSecService.allocateSecurityParameterIndex(
|
|
anyString(), anyInt(), anyObject()))
|
|
.thenReturn(spiResp);
|
|
|
|
try {
|
|
mIpSecManager.allocateSecurityParameterIndex(GOOGLE_DNS_4);
|
|
fail("ResourceUnavailableException was not thrown");
|
|
} catch (IpSecManager.ResourceUnavailableException e) {
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Should throw exception when request spi 0 in IpSecManager
|
|
*/
|
|
@Test
|
|
public void testRequestAllocInvalidSpi() throws Exception {
|
|
try {
|
|
mIpSecManager.allocateSecurityParameterIndex(GOOGLE_DNS_4, 0);
|
|
fail("Able to allocate invalid spi");
|
|
} catch (IllegalArgumentException e) {
|
|
}
|
|
}
|
|
|
|
@Test
|
|
public void testOpenEncapsulationSocket() throws Exception {
|
|
IpSecUdpEncapResponse udpEncapResp =
|
|
new IpSecUdpEncapResponse(
|
|
IpSecManager.Status.OK,
|
|
DUMMY_RESOURCE_ID,
|
|
TEST_UDP_ENCAP_PORT,
|
|
Os.socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP));
|
|
when(mMockIpSecService.openUdpEncapsulationSocket(eq(TEST_UDP_ENCAP_PORT), anyObject()))
|
|
.thenReturn(udpEncapResp);
|
|
|
|
IpSecManager.UdpEncapsulationSocket encapSocket =
|
|
mIpSecManager.openUdpEncapsulationSocket(TEST_UDP_ENCAP_PORT);
|
|
assertNotNull(encapSocket.getFileDescriptor());
|
|
assertEquals(TEST_UDP_ENCAP_PORT, encapSocket.getPort());
|
|
|
|
encapSocket.close();
|
|
|
|
verify(mMockIpSecService).closeUdpEncapsulationSocket(DUMMY_RESOURCE_ID);
|
|
}
|
|
|
|
@Test
|
|
public void testApplyTransportModeTransformEnsuresSocketCreation() throws Exception {
|
|
Socket socket = new Socket();
|
|
IpSecConfig dummyConfig = new IpSecConfig();
|
|
IpSecTransform dummyTransform = new IpSecTransform(null, dummyConfig);
|
|
|
|
// Even if underlying SocketImpl is not initalized, this should force the init, and
|
|
// thereby succeed.
|
|
mIpSecManager.applyTransportModeTransform(
|
|
socket, IpSecManager.DIRECTION_IN, dummyTransform);
|
|
|
|
// Check to make sure the FileDescriptor is non-null
|
|
assertNotNull(socket.getFileDescriptor$());
|
|
}
|
|
|
|
@Test
|
|
public void testRemoveTransportModeTransformsForcesSocketCreation() throws Exception {
|
|
Socket socket = new Socket();
|
|
|
|
// Even if underlying SocketImpl is not initalized, this should force the init, and
|
|
// thereby succeed.
|
|
mIpSecManager.removeTransportModeTransforms(socket);
|
|
|
|
// Check to make sure the FileDescriptor is non-null
|
|
assertNotNull(socket.getFileDescriptor$());
|
|
}
|
|
|
|
@Test
|
|
public void testOpenEncapsulationSocketOnRandomPort() throws Exception {
|
|
IpSecUdpEncapResponse udpEncapResp =
|
|
new IpSecUdpEncapResponse(
|
|
IpSecManager.Status.OK,
|
|
DUMMY_RESOURCE_ID,
|
|
TEST_UDP_ENCAP_PORT,
|
|
Os.socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP));
|
|
|
|
when(mMockIpSecService.openUdpEncapsulationSocket(eq(0), anyObject()))
|
|
.thenReturn(udpEncapResp);
|
|
|
|
IpSecManager.UdpEncapsulationSocket encapSocket =
|
|
mIpSecManager.openUdpEncapsulationSocket();
|
|
|
|
assertNotNull(encapSocket.getFileDescriptor());
|
|
assertEquals(TEST_UDP_ENCAP_PORT, encapSocket.getPort());
|
|
|
|
encapSocket.close();
|
|
|
|
verify(mMockIpSecService).closeUdpEncapsulationSocket(DUMMY_RESOURCE_ID);
|
|
}
|
|
|
|
@Test
|
|
public void testOpenEncapsulationSocketWithInvalidPort() throws Exception {
|
|
try {
|
|
mIpSecManager.openUdpEncapsulationSocket(IpSecManager.INVALID_SECURITY_PARAMETER_INDEX);
|
|
fail("IllegalArgumentException was not thrown");
|
|
} catch (IllegalArgumentException e) {
|
|
}
|
|
}
|
|
|
|
// TODO: add test when applicable transform builder interface is available
|
|
|
|
private IpSecManager.IpSecTunnelInterface createAndValidateVti(int resourceId, String intfName)
|
|
throws Exception {
|
|
IpSecTunnelInterfaceResponse dummyResponse =
|
|
new IpSecTunnelInterfaceResponse(IpSecManager.Status.OK, resourceId, intfName);
|
|
when(mMockIpSecService.createTunnelInterface(
|
|
eq(VTI_LOCAL_ADDRESS.getHostAddress()), eq(GOOGLE_DNS_4.getHostAddress()),
|
|
anyObject(), anyObject(), anyString()))
|
|
.thenReturn(dummyResponse);
|
|
|
|
IpSecManager.IpSecTunnelInterface tunnelIntf = mIpSecManager.createIpSecTunnelInterface(
|
|
VTI_LOCAL_ADDRESS, GOOGLE_DNS_4, mock(Network.class));
|
|
|
|
assertNotNull(tunnelIntf);
|
|
return tunnelIntf;
|
|
}
|
|
|
|
@Test
|
|
public void testCreateVti() throws Exception {
|
|
IpSecManager.IpSecTunnelInterface tunnelIntf =
|
|
createAndValidateVti(DUMMY_RESOURCE_ID, VTI_INTF_NAME);
|
|
|
|
assertEquals(VTI_INTF_NAME, tunnelIntf.getInterfaceName());
|
|
|
|
tunnelIntf.close();
|
|
verify(mMockIpSecService).deleteTunnelInterface(eq(DUMMY_RESOURCE_ID), anyString());
|
|
}
|
|
|
|
@Test
|
|
public void testAddRemoveAddressesFromVti() throws Exception {
|
|
IpSecManager.IpSecTunnelInterface tunnelIntf =
|
|
createAndValidateVti(DUMMY_RESOURCE_ID, VTI_INTF_NAME);
|
|
|
|
tunnelIntf.addAddress(VTI_INNER_ADDRESS.getAddress(),
|
|
VTI_INNER_ADDRESS.getPrefixLength());
|
|
verify(mMockIpSecService)
|
|
.addAddressToTunnelInterface(
|
|
eq(DUMMY_RESOURCE_ID), eq(VTI_INNER_ADDRESS), anyString());
|
|
|
|
tunnelIntf.removeAddress(VTI_INNER_ADDRESS.getAddress(),
|
|
VTI_INNER_ADDRESS.getPrefixLength());
|
|
verify(mMockIpSecService)
|
|
.addAddressToTunnelInterface(
|
|
eq(DUMMY_RESOURCE_ID), eq(VTI_INNER_ADDRESS), anyString());
|
|
}
|
|
}
|