/* * Copyright (C) 2018 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #define LOG_TAG "libnetd_resolv_test" #include #include #include // ResNsendFlags #include #include #include #include #include "dns_responder.h" #include "getaddrinfo.h" #include "gethnamaddr.h" #include "res_send.h" #include "resolv_cache.h" // TODO: make this dynamic and stop depending on implementation details. constexpr unsigned int TEST_NETID = 30; constexpr int MAXPACKET = (8 * 1024); // Specifying 0 in ai_socktype or ai_protocol of struct addrinfo indicates that any type or // protocol can be returned by getaddrinfo(). constexpr unsigned int ANY = 0; using android::base::StringPrintf; namespace android { namespace net { // Minimize class ResolverTest to be class TestBase because class TestBase doesn't need all member // functions of class ResolverTest and class DnsResponderClient. class TestBase : public ::testing::Test { protected: void SetUp() override { // Create cache for test resolv_create_cache_for_net(TEST_NETID); } void TearDown() override { // Delete cache for test resolv_delete_cache_for_net(TEST_NETID); } static std::string ToString(const hostent* he) { if (he == nullptr) return ""; char buffer[INET6_ADDRSTRLEN]; if (!inet_ntop(he->h_addrtype, he->h_addr_list[0], buffer, sizeof(buffer))) { return ""; } return buffer; } static std::string ToString(const addrinfo* ai) { if (!ai) return ""; for (const auto* aip = ai; aip != nullptr; aip = aip->ai_next) { char host[NI_MAXHOST]; int rv = getnameinfo(aip->ai_addr, aip->ai_addrlen, host, sizeof(host), nullptr, 0, NI_NUMERICHOST); if (rv != 0) return gai_strerror(rv); return host; } return ""; } size_t GetNumQueries(const test::DNSResponder& dns, const char* name) const { auto queries = dns.queries(); size_t found = 0; for (const auto& p : queries) { if (p.first == name) { ++found; } } return found; } const char* mDefaultSearchDomains = "example.com"; const res_params mDefaultParams_Binder = { .sample_validity = 300, .success_threshold = 25, .min_samples = 8, .max_samples = 8, .base_timeout_msec = 1000, .retry_count = 2, }; const android_net_context mNetcontext = { .app_netid = TEST_NETID, .app_mark = MARK_UNSET, .dns_netid = TEST_NETID, .dns_mark = MARK_UNSET, .uid = NET_CONTEXT_INVALID_UID, }; }; class GetAddrInfoForNetContextTest : public TestBase {}; class GetHostByNameForNetContextTest : public TestBase {}; TEST_F(GetAddrInfoForNetContextTest, InvalidParameters) { // Both null "netcontext" and null "res" of android_getaddrinfofornetcontext() are not tested // here because they are checked by assert() without returning any error number. // Invalid hostname and servname. // Both hostname and servname are null pointers. Expect error number EAI_NONAME. struct addrinfo* result = nullptr; int rv = android_getaddrinfofornetcontext(nullptr /*hostname*/, nullptr /*servname*/, nullptr /*hints*/, &mNetcontext, &result); EXPECT_EQ(EAI_NONAME, rv); if (result) { freeaddrinfo(result); result = nullptr; } // Invalid hints. // These place holders are used to test function call with unrequired parameters. // The content is not important because function call returns error directly if // there have any unrequired parameter. char placeholder_cname[] = "invalid_cname"; sockaddr placeholder_addr = {}; addrinfo placeholder_next = {}; static const struct TestConfig { int ai_flags; socklen_t ai_addrlen; char* ai_canonname; struct sockaddr* ai_addr; struct addrinfo* ai_next; int expected_errorno; // expected result std::string asParameters() const { return StringPrintf("0x%x/%u/%s/%p/%p", ai_flags, ai_addrlen, ai_canonname ? ai_canonname : "(null)", (void*) ai_addr, (void*) ai_next); } } testConfigs[]{ {0, sizeof(struct in_addr) /*bad*/, nullptr, nullptr, nullptr, EAI_BADHINTS}, {0, 0, placeholder_cname /*bad*/, nullptr, nullptr, EAI_BADHINTS}, {0, 0, nullptr, &placeholder_addr /*bad*/, nullptr, EAI_BADHINTS}, {0, 0, nullptr, nullptr, &placeholder_next /*bad*/, EAI_BADHINTS}, {AI_ALL /*bad*/, 0, nullptr, nullptr, nullptr, EAI_BADFLAGS}, {AI_V4MAPPED_CFG /*bad*/, 0, nullptr, nullptr, nullptr, EAI_BADFLAGS}, {AI_V4MAPPED /*bad*/, 0, nullptr, nullptr, nullptr, EAI_BADFLAGS}, {AI_DEFAULT /*bad*/, 0, nullptr, nullptr, nullptr, EAI_BADFLAGS}, }; for (const auto& config : testConfigs) { SCOPED_TRACE(config.asParameters()); // In current test configuration set, ai_family, ai_protocol and ai_socktype are not // checked because other fields cause hints error check failed first. const struct addrinfo hints = { .ai_flags = config.ai_flags, .ai_family = AF_UNSPEC, .ai_socktype = ANY, .ai_protocol = ANY, .ai_addrlen = config.ai_addrlen, .ai_canonname = config.ai_canonname, .ai_addr = config.ai_addr, .ai_next = config.ai_next, }; rv = android_getaddrinfofornetcontext("localhost", nullptr /*servname*/, &hints, &mNetcontext, &result); EXPECT_EQ(config.expected_errorno, rv); if (result) { freeaddrinfo(result); result = nullptr; } } } TEST_F(GetAddrInfoForNetContextTest, InvalidParameters_Family) { for (int family = 0; family < AF_MAX; ++family) { if (family == AF_UNSPEC || family == AF_INET || family == AF_INET6) { continue; // skip supported family } SCOPED_TRACE(StringPrintf("family: %d", family)); struct addrinfo* result = nullptr; const struct addrinfo hints = { .ai_family = family, // unsupported family }; int rv = android_getaddrinfofornetcontext("localhost", nullptr /*servname*/, &hints, &mNetcontext, &result); EXPECT_EQ(EAI_FAMILY, rv); if (result) freeaddrinfo(result); } } TEST_F(GetAddrInfoForNetContextTest, InvalidParameters_MeaningfulSocktypeAndProtocolCombination) { static const int families[] = {PF_INET, PF_INET6, PF_UNSPEC}; // Skip to test socket type SOCK_RAW in meaningful combination (explore_options[]) of // system\netd\resolv\getaddrinfo.cpp. In explore_options[], the socket type SOCK_RAW always // comes with protocol ANY which causes skipping meaningful socktype/protocol combination // check. So it nerver returns error number EAI_BADHINTS which we want to test in this test // case. static const int socktypes[] = {SOCK_STREAM, SOCK_DGRAM}; // If both socktype/protocol are specified, check non-meaningful combination returns // expected error number EAI_BADHINTS. See meaningful combination in explore_options[] of // system\netd\resolv\getaddrinfo.cpp. for (const auto& family : families) { for (const auto& socktype : socktypes) { for (int protocol = 0; protocol < IPPROTO_MAX; ++protocol) { SCOPED_TRACE(StringPrintf("family: %d, socktype: %d, protocol: %d", family, socktype, protocol)); // Both socktype/protocol need to be specified. if (!socktype || !protocol) continue; // Skip meaningful combination in explore_options[] of // system\netd\resolv\getaddrinfo.cpp. if ((family == AF_INET6 && socktype == SOCK_DGRAM && protocol == IPPROTO_UDP) || (family == AF_INET6 && socktype == SOCK_STREAM && protocol == IPPROTO_TCP) || (family == AF_INET && socktype == SOCK_DGRAM && protocol == IPPROTO_UDP) || (family == AF_INET && socktype == SOCK_STREAM && protocol == IPPROTO_TCP) || (family == AF_UNSPEC && socktype == SOCK_DGRAM && protocol == IPPROTO_UDP) || (family == AF_UNSPEC && socktype == SOCK_STREAM && protocol == IPPROTO_TCP)) { continue; } struct addrinfo* result = nullptr; const struct addrinfo hints = { .ai_family = family, .ai_protocol = protocol, .ai_socktype = socktype, }; int rv = android_getaddrinfofornetcontext("localhost", nullptr /*servname*/, &hints, &mNetcontext, &result); EXPECT_EQ(EAI_BADHINTS, rv); if (result) freeaddrinfo(result); } } } } TEST_F(GetAddrInfoForNetContextTest, InvalidParameters_PortNameAndNumber) { constexpr char http_portno[] = "80"; constexpr char invalid_portno[] = "65536"; // out of valid port range from 0 to 65535 constexpr char http_portname[] = "http"; constexpr char invalid_portname[] = "invalid_portname"; static const struct TestConfig { int ai_flags; int ai_family; int ai_socktype; const char* servname; int expected_errorno; // expected result std::string asParameters() const { return StringPrintf("0x%x/%d/%d/%s", ai_flags, ai_family, ai_socktype, servname ? servname : "(null)"); } } testConfigs[]{ {0, AF_INET, SOCK_RAW /*bad*/, http_portno, EAI_SERVICE}, {0, AF_INET6, SOCK_RAW /*bad*/, http_portno, EAI_SERVICE}, {0, AF_UNSPEC, SOCK_RAW /*bad*/, http_portno, EAI_SERVICE}, {0, AF_INET, SOCK_RDM /*bad*/, http_portno, EAI_SOCKTYPE}, {0, AF_INET6, SOCK_RDM /*bad*/, http_portno, EAI_SOCKTYPE}, {0, AF_UNSPEC, SOCK_RDM /*bad*/, http_portno, EAI_SOCKTYPE}, {0, AF_INET, SOCK_SEQPACKET /*bad*/, http_portno, EAI_SOCKTYPE}, {0, AF_INET6, SOCK_SEQPACKET /*bad*/, http_portno, EAI_SOCKTYPE}, {0, AF_UNSPEC, SOCK_SEQPACKET /*bad*/, http_portno, EAI_SOCKTYPE}, {0, AF_INET, SOCK_DCCP /*bad*/, http_portno, EAI_SOCKTYPE}, {0, AF_INET6, SOCK_DCCP /*bad*/, http_portno, EAI_SOCKTYPE}, {0, AF_UNSPEC, SOCK_DCCP /*bad*/, http_portno, EAI_SOCKTYPE}, {0, AF_INET, SOCK_PACKET /*bad*/, http_portno, EAI_SOCKTYPE}, {0, AF_INET6, SOCK_PACKET /*bad*/, http_portno, EAI_SOCKTYPE}, {0, AF_UNSPEC, SOCK_PACKET /*bad*/, http_portno, EAI_SOCKTYPE}, {0, AF_INET, ANY, invalid_portno /*bad*/, EAI_SERVICE}, {0, AF_INET, SOCK_STREAM, invalid_portno /*bad*/, EAI_SERVICE}, {0, AF_INET, SOCK_DGRAM, invalid_portno /*bad*/, EAI_SERVICE}, {0, AF_INET6, ANY, invalid_portno /*bad*/, EAI_SERVICE}, {0, AF_INET6, SOCK_STREAM, invalid_portno /*bad*/, EAI_SERVICE}, {0, AF_INET6, SOCK_DGRAM, invalid_portno /*bad*/, EAI_SERVICE}, {0, AF_UNSPEC, ANY, invalid_portno /*bad*/, EAI_SERVICE}, {0, AF_UNSPEC, SOCK_STREAM, invalid_portno /*bad*/, EAI_SERVICE}, {0, AF_UNSPEC, SOCK_DGRAM, invalid_portno /*bad*/, EAI_SERVICE}, {AI_NUMERICSERV, AF_INET, ANY, http_portname /*bad*/, EAI_NONAME}, {AI_NUMERICSERV, AF_INET, SOCK_STREAM, http_portname /*bad*/, EAI_NONAME}, {AI_NUMERICSERV, AF_INET, SOCK_DGRAM, http_portname /*bad*/, EAI_NONAME}, {AI_NUMERICSERV, AF_INET6, ANY, http_portname /*bad*/, EAI_NONAME}, {AI_NUMERICSERV, AF_INET6, SOCK_STREAM, http_portname /*bad*/, EAI_NONAME}, {AI_NUMERICSERV, AF_INET6, SOCK_DGRAM, http_portname /*bad*/, EAI_NONAME}, {AI_NUMERICSERV, AF_UNSPEC, ANY, http_portname /*bad*/, EAI_NONAME}, {AI_NUMERICSERV, AF_UNSPEC, SOCK_STREAM, http_portname /*bad*/, EAI_NONAME}, {AI_NUMERICSERV, AF_UNSPEC, SOCK_DGRAM, http_portname /*bad*/, EAI_NONAME}, {0, AF_INET, ANY, invalid_portname /*bad*/, EAI_SERVICE}, {0, AF_INET, SOCK_STREAM, invalid_portname /*bad*/, EAI_SERVICE}, {0, AF_INET, SOCK_DGRAM, invalid_portname /*bad*/, EAI_SERVICE}, {0, AF_INET6, ANY, invalid_portname /*bad*/, EAI_SERVICE}, {0, AF_INET6, SOCK_STREAM, invalid_portname /*bad*/, EAI_SERVICE}, {0, AF_INET6, SOCK_DGRAM, invalid_portname /*bad*/, EAI_SERVICE}, {0, AF_UNSPEC, ANY, invalid_portname /*bad*/, EAI_SERVICE}, {0, AF_UNSPEC, SOCK_STREAM, invalid_portname /*bad*/, EAI_SERVICE}, {0, AF_UNSPEC, SOCK_DGRAM, invalid_portname /*bad*/, EAI_SERVICE}, }; for (const auto& config : testConfigs) { const std::string testParameters = config.asParameters(); SCOPED_TRACE(testParameters); const struct addrinfo hints = { .ai_flags = config.ai_flags, .ai_family = config.ai_family, .ai_socktype = config.ai_socktype, }; struct addrinfo* result = nullptr; int rv = android_getaddrinfofornetcontext("localhost", config.servname, &hints, &mNetcontext, &result); EXPECT_EQ(config.expected_errorno, rv); if (result) freeaddrinfo(result); } } TEST_F(GetAddrInfoForNetContextTest, AlphabeticalHostname_NoData) { constexpr char listen_addr[] = "127.0.0.3"; constexpr char listen_srv[] = "53"; constexpr char v4_host_name[] = "v4only.example.com."; test::DNSResponder dns(listen_addr, listen_srv, 250, ns_rcode::ns_r_servfail); dns.addMapping(v4_host_name, ns_type::ns_t_a, "1.2.3.3"); ASSERT_TRUE(dns.startServer()); const char* servers[] = {listen_addr}; ASSERT_EQ(0, resolv_set_nameservers_for_net(TEST_NETID, servers, sizeof(servers) / sizeof(servers[0]), mDefaultSearchDomains, &mDefaultParams_Binder)); dns.clearQueries(); // Want AAAA answer but DNS server has A answer only. struct addrinfo* result = nullptr; const addrinfo hints = {.ai_family = AF_INET6}; int rv = android_getaddrinfofornetcontext("v4only", nullptr, &hints, &mNetcontext, &result); EXPECT_LE(1U, GetNumQueries(dns, v4_host_name)); EXPECT_TRUE(result == nullptr); EXPECT_EQ(EAI_NODATA, rv); if (result) freeaddrinfo(result); } TEST_F(GetAddrInfoForNetContextTest, AlphabeticalHostname) { constexpr char listen_addr[] = "127.0.0.3"; constexpr char listen_srv[] = "53"; constexpr char host_name[] = "sawadee.example.com."; constexpr char v4addr[] = "1.2.3.4"; constexpr char v6addr[] = "::1.2.3.4"; test::DNSResponder dns(listen_addr, listen_srv, 250, ns_rcode::ns_r_servfail); dns.addMapping(host_name, ns_type::ns_t_a, v4addr); dns.addMapping(host_name, ns_type::ns_t_aaaa, v6addr); ASSERT_TRUE(dns.startServer()); const char* servers[] = {listen_addr}; ASSERT_EQ(0, resolv_set_nameservers_for_net(TEST_NETID, servers, sizeof(servers) / sizeof(servers[0]), mDefaultSearchDomains, &mDefaultParams_Binder)); static const struct TestConfig { int ai_family; const std::string expected_addr; } testConfigs[]{ {AF_INET, v4addr}, {AF_INET6, v6addr}, }; for (const auto& config : testConfigs) { SCOPED_TRACE(StringPrintf("family: %d", config.ai_family)); dns.clearQueries(); struct addrinfo* result = nullptr; const struct addrinfo hints = {.ai_family = config.ai_family}; int rv = android_getaddrinfofornetcontext("sawadee", nullptr, &hints, &mNetcontext, &result); EXPECT_EQ(0, rv); EXPECT_TRUE(result != nullptr); EXPECT_EQ(1U, GetNumQueries(dns, host_name)); EXPECT_EQ(config.expected_addr, ToString(result)); if (result) freeaddrinfo(result); } } TEST_F(GetAddrInfoForNetContextTest, ServerResponseError) { constexpr char listen_addr[] = "127.0.0.3"; constexpr char listen_srv[] = "53"; constexpr char host_name[] = "hello.example.com."; static const struct TestConfig { ns_rcode rcode; int expected_errorno; // expected result // Only test failure RCODE [1..5] in RFC 1035 section 4.1.1 and skip successful RCODE 0 // which means no error. } testConfigs[]{ // clang-format off {ns_rcode::ns_r_formerr, EAI_FAIL}, {ns_rcode::ns_r_servfail, EAI_AGAIN}, {ns_rcode::ns_r_nxdomain, EAI_NODATA}, {ns_rcode::ns_r_notimpl, EAI_FAIL}, {ns_rcode::ns_r_refused, EAI_FAIL}, // clang-format on }; for (const auto& config : testConfigs) { SCOPED_TRACE(StringPrintf("rcode: %d", config.rcode)); test::DNSResponder dns(listen_addr, listen_srv, 250, config.rcode /*response specific rcode*/); dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.4"); dns.setResponseProbability(0.0); // always ignore requests and response preset rcode ASSERT_TRUE(dns.startServer()); const char* servers[] = {listen_addr}; ASSERT_EQ(0, resolv_set_nameservers_for_net(TEST_NETID, servers, sizeof(servers) / sizeof(servers[0]), mDefaultSearchDomains, &mDefaultParams_Binder)); struct addrinfo* result = nullptr; const struct addrinfo hints = {.ai_family = AF_UNSPEC}; int rv = android_getaddrinfofornetcontext(host_name, nullptr, &hints, &mNetcontext, &result); EXPECT_EQ(config.expected_errorno, rv); if (result) freeaddrinfo(result); } } // TODO: Add private DNS server timeout test. TEST_F(GetAddrInfoForNetContextTest, ServerTimeout) { constexpr char listen_addr[] = "127.0.0.3"; constexpr char listen_srv[] = "53"; constexpr char host_name[] = "hello.example.com."; test::DNSResponder dns(listen_addr, listen_srv, 250, static_cast(-1) /*no response*/); dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.4"); dns.setResponseProbability(0.0); // always ignore requests and don't response ASSERT_TRUE(dns.startServer()); const char* servers[] = {listen_addr}; ASSERT_EQ(0, resolv_set_nameservers_for_net(TEST_NETID, servers, sizeof(servers) / sizeof(servers[0]), mDefaultSearchDomains, &mDefaultParams_Binder)); struct addrinfo* result = nullptr; const struct addrinfo hints = {.ai_family = AF_UNSPEC}; int rv = android_getaddrinfofornetcontext("hello", nullptr, &hints, &mNetcontext, &result); EXPECT_EQ(NETD_RESOLV_TIMEOUT, rv); if (result) freeaddrinfo(result); } namespace { std::string toString(uint8_t* buf, int bufLen, int ipType) { ns_msg handle; int ancount, n = 0; ns_rr rr; if (ns_initparse((const uint8_t*)buf, bufLen, &handle) >= 0) { ancount = ns_msg_count(handle, ns_s_an); if (ns_parserr(&handle, ns_s_an, n, &rr) == 0) { const uint8_t* rdata = ns_rr_rdata(rr); char buffer[INET6_ADDRSTRLEN]; if (inet_ntop(ipType, (const char*)rdata, buffer, sizeof(buffer))) { return buffer; } } } return ""; } std::string resolvResNsendHelper(const android_net_context* _Nonnull netContext, const char* host, int nsType, int flag) { std::vector ansBuf(MAXPACKET, 0); int rcode = ns_r_noerror; std::vector msg(MAXPACKET, 0); const int msgLen = res_mkquery(ns_o_query, host, ns_c_in, nsType, nullptr, 0, nullptr, msg.data(), MAXPACKET); const int nsendAns = resolv_res_nsend(netContext, msg.data(), msgLen, ansBuf.data(), MAXPACKET, &rcode, static_cast(flag)); return toString(ansBuf.data(), nsendAns, (nsType == ns_t_a) ? AF_INET : AF_INET6); } } // namespace TEST_F(GetAddrInfoForNetContextTest, Async_CacheFlags) { constexpr char listen_addr[] = "127.0.0.3"; constexpr char listen_srv[] = "53"; constexpr char host1[] = "howdy.example.com."; constexpr char host2[] = "howdy.example2.com."; constexpr char host3[] = "howdy.example3.com."; test::DNSResponder dns(listen_addr, listen_srv, 250, ns_rcode::ns_r_servfail); dns.addMapping(host1, ns_type::ns_t_a, "1.2.3.4"); dns.addMapping(host3, ns_type::ns_t_a, "1.2.3.6"); dns.addMapping(host2, ns_type::ns_t_aaaa, "::1.2.3.5"); dns.addMapping(host3, ns_type::ns_t_aaaa, "::1.2.3.6"); ASSERT_TRUE(dns.startServer()); const char* servers[] = {listen_addr}; ASSERT_EQ(0, resolv_set_nameservers_for_net(TEST_NETID, servers, sizeof(servers) / sizeof(servers[0]), mDefaultSearchDomains, &mDefaultParams_Binder)); EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host1, ns_t_a, ANDROID_RESOLV_NO_CACHE_STORE), "1.2.3.4"); EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host1, ns_t_a, ANDROID_RESOLV_NO_CACHE_STORE), "1.2.3.4"); EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host1, ns_t_a, ANDROID_RESOLV_NO_CACHE_STORE), "1.2.3.4"); // No cache exists, expect 3 queries EXPECT_EQ(3U, GetNumQueries(dns, host1)); // no query because of the cache // Raise a query with no flags to ensure no cache exists. Also make an cache entry for the // query. EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host1, ns_t_a, 0), "1.2.3.4"); // Expect 4 queries because there should be no cache before this query. EXPECT_EQ(4U, GetNumQueries(dns, host1)); // Now we have the cache entry, re-query with ANDROID_RESOLV_NO_CACHE_STORE to ensure // that ANDROID_RESOLV_NO_CACHE_STORE implied ANDROID_RESOLV_NO_CACHE_LOOKUP. EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host1, ns_t_a, ANDROID_RESOLV_NO_CACHE_STORE), "1.2.3.4"); // Expect 5 queries because we shouldn't do cache lookup for the query which has // ANDROID_RESOLV_NO_CACHE_STORE. EXPECT_EQ(5U, GetNumQueries(dns, host1)); // ANDROID_RESOLV_NO_CACHE_LOOKUP EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host1, ns_t_a, ANDROID_RESOLV_NO_CACHE_LOOKUP), "1.2.3.4"); EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host1, ns_t_a, ANDROID_RESOLV_NO_CACHE_LOOKUP), "1.2.3.4"); // Cache was skipped, expect 2 more queries. EXPECT_EQ(7U, GetNumQueries(dns, host1)); // Re-query verify cache works EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host1, ns_t_a, 0), "1.2.3.4"); // Cache hits, expect still 7 queries EXPECT_EQ(7U, GetNumQueries(dns, host1)); // Start to verify if ANDROID_RESOLV_NO_CACHE_LOOKUP does write response into cache dns.clearQueries(); EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host2, ns_t_aaaa, ANDROID_RESOLV_NO_CACHE_LOOKUP), "::1.2.3.5"); EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host2, ns_t_aaaa, ANDROID_RESOLV_NO_CACHE_LOOKUP), "::1.2.3.5"); // Skip cache, expect 2 queries EXPECT_EQ(2U, GetNumQueries(dns, host2)); // Re-query without flags EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host2, ns_t_aaaa, 0), "::1.2.3.5"); EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host2, ns_t_aaaa, 0), "::1.2.3.5"); // Cache hits, expect still 2 queries EXPECT_EQ(2U, GetNumQueries(dns, host2)); // Test both ANDROID_RESOLV_NO_CACHE_STORE and ANDROID_RESOLV_NO_CACHE_LOOKUP are set dns.clearQueries(); // Make sure that the cache of "howdy.example3.com" exists. EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host3, ns_t_aaaa, 0), "::1.2.3.6"); EXPECT_EQ(1U, GetNumQueries(dns, host3)); // Re-query with testFlags const int testFlag = ANDROID_RESOLV_NO_CACHE_STORE | ANDROID_RESOLV_NO_CACHE_LOOKUP; EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host3, ns_t_aaaa, testFlag), "::1.2.3.6"); // Expect cache lookup is skipped. EXPECT_EQ(2U, GetNumQueries(dns, host3)); // Do another query with testFlags EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host3, ns_t_a, testFlag), "1.2.3.6"); // Expect cache lookup is skipped. EXPECT_EQ(3U, GetNumQueries(dns, host3)); // Re-query with no flags EXPECT_EQ(resolvResNsendHelper(&mNetcontext, host3, ns_t_a, testFlag), "1.2.3.6"); // Expect no cache hit because cache storing is also skipped in previous query. EXPECT_EQ(4U, GetNumQueries(dns, host3)); } TEST_F(GetHostByNameForNetContextTest, AlphabeticalHostname) { constexpr char listen_addr[] = "127.0.0.3"; constexpr char listen_srv[] = "53"; constexpr char host_name[] = "jiababuei.example.com."; constexpr char v4addr[] = "1.2.3.4"; constexpr char v6addr[] = "::1.2.3.4"; test::DNSResponder dns(listen_addr, listen_srv, 250, ns_rcode::ns_r_servfail); dns.addMapping(host_name, ns_type::ns_t_a, v4addr); dns.addMapping(host_name, ns_type::ns_t_aaaa, v6addr); ASSERT_TRUE(dns.startServer()); const char* servers[] = {listen_addr}; ASSERT_EQ(0, resolv_set_nameservers_for_net(TEST_NETID, servers, sizeof(servers) / sizeof(servers[0]), mDefaultSearchDomains, &mDefaultParams_Binder)); static const struct TestConfig { int ai_family; const std::string expected_addr; } testConfigs[]{ {AF_INET, v4addr}, {AF_INET6, v6addr}, }; for (const auto& config : testConfigs) { SCOPED_TRACE(StringPrintf("family: %d", config.ai_family)); dns.clearQueries(); struct hostent* hp = nullptr; int rv = android_gethostbynamefornetcontext("jiababuei", config.ai_family, &mNetcontext, &hp); EXPECT_EQ(0, rv); EXPECT_TRUE(hp != nullptr); EXPECT_EQ(1U, GetNumQueries(dns, host_name)); EXPECT_EQ(config.expected_addr, ToString(hp)); } } TEST_F(GetHostByNameForNetContextTest, NoData) { constexpr char listen_addr[] = "127.0.0.3"; constexpr char listen_srv[] = "53"; constexpr char v4_host_name[] = "v4only.example.com."; test::DNSResponder dns(listen_addr, listen_srv, 250, ns_rcode::ns_r_servfail); dns.addMapping(v4_host_name, ns_type::ns_t_a, "1.2.3.3"); ASSERT_TRUE(dns.startServer()); const char* servers[] = {listen_addr}; ASSERT_EQ(0, resolv_set_nameservers_for_net(TEST_NETID, servers, sizeof(servers) / sizeof(servers[0]), mDefaultSearchDomains, &mDefaultParams_Binder)); dns.clearQueries(); // Want AAAA answer but DNS server has A answer only. struct hostent* hp = nullptr; int rv = android_gethostbynamefornetcontext("v4only", AF_INET6, &mNetcontext, &hp); EXPECT_LE(1U, GetNumQueries(dns, v4_host_name)); EXPECT_TRUE(hp == nullptr); EXPECT_EQ(EAI_NODATA, rv); } TEST_F(GetHostByNameForNetContextTest, ServerResponseError) { constexpr char listen_addr[] = "127.0.0.3"; constexpr char listen_srv[] = "53"; constexpr char host_name[] = "hello.example.com."; static const struct TestConfig { ns_rcode rcode; int expected_errorno; // expected result // Only test failure RCODE [1..5] in RFC 1035 section 4.1.1 and skip successful RCODE 0 // which means no error. Note that the return error codes aren't mapped by rcode in the // test case SERVFAIL, NOTIMP and REFUSED. See the comment of res_nsend() // in system\netd\resolv\res_query.cpp for more detail. } testConfigs[]{ // clang-format off {ns_rcode::ns_r_formerr, EAI_FAIL}, {ns_rcode::ns_r_servfail, EAI_AGAIN}, // Not mapped by rcode. {ns_rcode::ns_r_nxdomain, EAI_NODATA}, {ns_rcode::ns_r_notimpl, EAI_AGAIN}, // Not mapped by rcode. {ns_rcode::ns_r_refused, EAI_AGAIN}, // Not mapped by rcode. // clang-format on }; for (const auto& config : testConfigs) { SCOPED_TRACE(StringPrintf("rcode: %d", config.rcode)); test::DNSResponder dns(listen_addr, listen_srv, 250, config.rcode /*response specific rcode*/); dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.4"); dns.setResponseProbability(0.0); // always ignore requests and response preset rcode ASSERT_TRUE(dns.startServer()); const char* servers[] = {listen_addr}; ASSERT_EQ(0, resolv_set_nameservers_for_net(TEST_NETID, servers, sizeof(servers) / sizeof(servers[0]), mDefaultSearchDomains, &mDefaultParams_Binder)); struct hostent* hp = nullptr; int rv = android_gethostbynamefornetcontext(host_name, AF_INET, &mNetcontext, &hp); EXPECT_TRUE(hp == nullptr); EXPECT_EQ(config.expected_errorno, rv); } } // TODO: Add private DNS server timeout test. TEST_F(GetHostByNameForNetContextTest, ServerTimeout) { constexpr char listen_addr[] = "127.0.0.3"; constexpr char listen_srv[] = "53"; constexpr char host_name[] = "hello.example.com."; test::DNSResponder dns(listen_addr, listen_srv, 250, static_cast(-1) /*no response*/); dns.addMapping(host_name, ns_type::ns_t_a, "1.2.3.4"); dns.setResponseProbability(0.0); // always ignore requests and don't response ASSERT_TRUE(dns.startServer()); const char* servers[] = {listen_addr}; ASSERT_EQ(0, resolv_set_nameservers_for_net(TEST_NETID, servers, sizeof(servers) / sizeof(servers[0]), mDefaultSearchDomains, &mDefaultParams_Binder)); struct hostent* hp = nullptr; int rv = android_gethostbynamefornetcontext(host_name, AF_INET, &mNetcontext, &hp); EXPECT_EQ(NETD_RESOLV_TIMEOUT, rv); } // Note that local host file function, files_getaddrinfo(), of android_getaddrinfofornetcontext() // is not tested because it only returns a boolean (success or failure) without any error number. // TODO: Add test NULL hostname, or numeric hostname for android_getaddrinfofornetcontext. // TODO: Add test invalid parameters for android_gethostbynamefornetcontext. // TODO: Add test for android_gethostbyaddrfornetcontext. } // end of namespace net } // end of namespace android