/*
* Copyright 2017 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* RouteControllerTest.cpp - unit tests for RouteController.cpp
*/
#include <gtest/gtest.h>
#include "Fwmark.h"
#include "IptablesBaseTest.h"
#include "NetlinkCommands.h"
#include "RouteController.h"
#include <android-base/stringprintf.h>
using android::base::StringPrintf;
namespace android {
namespace net {
class RouteControllerTest : public IptablesBaseTest {
public:
RouteControllerTest() {
RouteController::iptablesRestoreCommandFunction = fakeExecIptablesRestoreCommand;
}
int flushRoutes(uint32_t a) {
return RouteController::flushRoutes(a);
}
};
TEST_F(RouteControllerTest, TestGetRulePriority) {
// Expect a rule dump for these two families to contain at least the following priorities.
for (int family : {AF_INET, AF_INET6 }) {
std::set<uint32_t> expectedPriorities = {
0,
15000, // RULE_PRIORITY_LEGACY_SYSTEM
16000, // RULE_PRIORITY_LEGACY_NETWORK
32000, // RULE_PRIORITY_UNREACHABLE
};
NetlinkDumpCallback callback = [&expectedPriorities] (const nlmsghdr *nlh) {
expectedPriorities.erase(getRulePriority(nlh));
};
rtmsg rtm = { .rtm_family = static_cast<uint8_t>(family) };
iovec iov[] = {
{ nullptr, 0 },
{ &rtm, sizeof(rtm) },
};
ASSERT_EQ(0, sendNetlinkRequest(RTM_GETRULE, NETLINK_DUMP_FLAGS,
iov, ARRAY_SIZE(iov), &callback));
EXPECT_TRUE(expectedPriorities.empty()) <<
"Did not see rule with priority " << *expectedPriorities.begin() <<
" in dump for address family " << family;
}
}
TEST_F(RouteControllerTest, TestRouteFlush) {
// Pick a table number that's not used by the system.
const uint32_t table1 = 500;
const uint32_t table2 = 600;
static_assert(table1 < RouteController::ROUTE_TABLE_OFFSET_FROM_INDEX,
"Test table1 number too large");
static_assert(table2 < RouteController::ROUTE_TABLE_OFFSET_FROM_INDEX,
"Test table2 number too large");
EXPECT_EQ(0, modifyIpRoute(RTM_NEWROUTE, table1, "lo", "192.0.2.2/32", NULL));
EXPECT_EQ(0, modifyIpRoute(RTM_NEWROUTE, table1, "lo", "192.0.2.3/32", NULL));
EXPECT_EQ(0, modifyIpRoute(RTM_NEWROUTE, table2, "lo", "192.0.2.4/32", NULL));
EXPECT_EQ(0, flushRoutes(table1));
EXPECT_EQ(-ESRCH,
modifyIpRoute(RTM_DELROUTE, table1, "lo", "192.0.2.2/32", NULL));
EXPECT_EQ(-ESRCH,
modifyIpRoute(RTM_DELROUTE, table1, "lo", "192.0.2.3/32", NULL));
EXPECT_EQ(0,
modifyIpRoute(RTM_DELROUTE, table2, "lo", "192.0.2.4/32", NULL));
}
TEST_F(RouteControllerTest, TestModifyIncomingPacketMark) {
uint32_t mask = ~Fwmark::getUidBillingMask();
static constexpr int TEST_NETID = 30;
EXPECT_EQ(0, modifyIncomingPacketMark(TEST_NETID, "netdtest0",
PERMISSION_NONE, true));
expectIptablesRestoreCommands({StringPrintf(
"-t mangle -A routectrl_mangle_INPUT -i netdtest0 -j MARK --set-mark "
"0x3001e/0x%x",
mask)});
EXPECT_EQ(0, modifyIncomingPacketMark(TEST_NETID, "netdtest0",
PERMISSION_NONE, false));
expectIptablesRestoreCommands({StringPrintf(
"-t mangle -D routectrl_mangle_INPUT -i netdtest0 -j MARK --set-mark "
"0x3001e/0x%x",
mask)});
}
} // namespace net
} // namespace android