/*
* Copyright 2016 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* IptablesBaseTest.cpp - utility class for tests that use iptables
*/
#include <deque>
#include <string>
#include <vector>
#include <gtest/gtest.h>
#include <android-base/stringprintf.h>
#include "IptablesBaseTest.h"
#include "NetdConstants.h"
#define LOG_TAG "IptablesBaseTest"
#include <cutils/log.h>
using android::base::StringPrintf;
IptablesBaseTest::IptablesBaseTest() {
sCmds.clear();
sRestoreCmds.clear();
sReturnValues.clear();
}
int IptablesBaseTest::fake_android_fork_exec(int argc, char* argv[], int *status, bool, bool) {
std::string cmd = argv[0];
for (int i = 1; i < argc; i++) {
if (argv[i] == NULL) break; // NatController likes to pass in invalid argc values.
cmd += " ";
cmd += argv[i];
}
sCmds.push_back(cmd);
int ret;
if (sReturnValues.size()) {
ret = sReturnValues.front();
sReturnValues.pop_front();
} else {
ret = 0;
}
if (status) {
*status = ret;
}
return ret;
}
int IptablesBaseTest::fakeExecIptables(IptablesTarget target, ...) {
std::string cmd = " -w";
va_list args;
va_start(args, target);
const char *arg;
do {
arg = va_arg(args, const char *);
if (arg != nullptr) {
cmd += " ";
cmd += arg;
}
} while (arg);
if (target == V4 || target == V4V6) {
sCmds.push_back(IPTABLES_PATH + cmd);
}
if (target == V6 || target == V4V6) {
sCmds.push_back(IP6TABLES_PATH + cmd);
}
return 0;
}
FILE *IptablesBaseTest::fake_popen(const char * /* cmd */, const char *type) {
if (sPopenContents.empty() || strcmp(type, "r") != 0) {
return NULL;
}
std::string realCmd = StringPrintf("echo '%s'", sPopenContents.front().c_str());
sPopenContents.pop_front();
return popen(realCmd.c_str(), "r");
}
int IptablesBaseTest::fakeExecIptablesRestoreWithOutput(IptablesTarget target,
const std::string& commands,
std::string *output) {
sRestoreCmds.push_back({ target, commands });
if (output != nullptr) {
*output = sIptablesRestoreOutput.size() ? sIptablesRestoreOutput.front().c_str() : "";
}
if (sIptablesRestoreOutput.size()) {
sIptablesRestoreOutput.pop_front();
}
return 0;
}
int IptablesBaseTest::fakeExecIptablesRestore(IptablesTarget target, const std::string& commands) {
return fakeExecIptablesRestoreWithOutput(target, commands, nullptr);
}
int IptablesBaseTest::fakeExecIptablesRestoreCommand(IptablesTarget target,
const std::string& table,
const std::string& command,
std::string *output) {
std::string fullCmd = StringPrintf("-t %s %s", table.c_str(), command.c_str());
return fakeExecIptablesRestoreWithOutput(target, fullCmd, output);
}
int IptablesBaseTest::expectIptablesCommand(IptablesTarget target, int pos,
const std::string& cmd) {
if ((unsigned) pos >= sCmds.size()) {
ADD_FAILURE() << "Expected too many iptables commands, want command "
<< pos + 1 << "/" << sCmds.size();
return -1;
}
if (target == V4 || target == V4V6) {
EXPECT_EQ("/system/bin/iptables -w " + cmd, sCmds[pos++]);
}
if (target == V6 || target == V4V6) {
EXPECT_EQ("/system/bin/ip6tables -w " + cmd, sCmds[pos++]);
}
return target == V4V6 ? 2 : 1;
}
void IptablesBaseTest::expectIptablesCommands(const std::vector<std::string>& expectedCmds) {
ExpectedIptablesCommands expected;
for (auto cmd : expectedCmds) {
expected.push_back({ V4V6, cmd });
}
expectIptablesCommands(expected);
}
void IptablesBaseTest::expectIptablesCommands(const ExpectedIptablesCommands& expectedCmds) {
size_t pos = 0;
for (size_t i = 0; i < expectedCmds.size(); i ++) {
auto target = expectedCmds[i].first;
auto cmd = expectedCmds[i].second;
int numConsumed = expectIptablesCommand(target, pos, cmd);
if (numConsumed < 0) {
// Read past the end of the array.
break;
}
pos += numConsumed;
}
EXPECT_EQ(pos, sCmds.size());
sCmds.clear();
}
void IptablesBaseTest::expectIptablesCommands(
const std::vector<ExpectedIptablesCommands>& snippets) {
ExpectedIptablesCommands expected;
for (const auto& snippet: snippets) {
expected.insert(expected.end(), snippet.begin(), snippet.end());
}
expectIptablesCommands(expected);
}
void IptablesBaseTest::expectIptablesRestoreCommands(const std::vector<std::string>& expectedCmds) {
ExpectedIptablesCommands expected;
for (auto cmd : expectedCmds) {
expected.push_back({ V4V6, cmd });
}
expectIptablesRestoreCommands(expected);
}
void IptablesBaseTest::expectIptablesRestoreCommands(const ExpectedIptablesCommands& expectedCmds) {
EXPECT_EQ(expectedCmds.size(), sRestoreCmds.size());
for (size_t i = 0; i < expectedCmds.size(); i++) {
EXPECT_EQ(expectedCmds[i], sRestoreCmds[i]) <<
"iptables-restore command " << i << " differs";
}
sRestoreCmds.clear();
}
void IptablesBaseTest::setReturnValues(const std::deque<int>& returnValues) {
sReturnValues = returnValues;
}
std::vector<std::string> IptablesBaseTest::sCmds = {};
IptablesBaseTest::ExpectedIptablesCommands IptablesBaseTest::sRestoreCmds = {};
std::deque<std::string> IptablesBaseTest::sPopenContents = {};
std::deque<std::string> IptablesBaseTest::sIptablesRestoreOutput = {};
std::deque<int> IptablesBaseTest::sReturnValues = {};