- Oct 13, 2023
-
-
Chalard Jean authored
This doesn't do anything at this patchset, but the whole pipe from the agent to ConnectivityService is built. LocalNetworkInfo will be the name of the public information sent in callbacks to clients. Test: CSLocalAgentTests Change-Id: I70e133031ef3b0aaf6c3e59ccc2ad895c66d339c
-
Chalard Jean authored
This patch does the following : • When a network is local but the system doesn't support it, throw in registerNetworkAgent. • When a network is local, tell netd about it. • Add tests for the above, as well as a test for callbacks being sent correctly when the caps are set and not when they aren't and that the new keep connected flag is respected. Telling netd about the network being local has it add two routes that do not exist if the network is not local : • One at PRIORITY_LOCAL_NETWORK matching unmarked sockets and looking up the table for the interface. 20000: from all fwmark 0x0/0x10000 lookup xxxx • One at PRIORITY_EXPLICIT_NETWORK matching explicitly on network 99, so that dnsmasq traffic and any OEM traffic marked for network 99 flowing there. 16000: from all fwmark 0x10063/0x1ffff iif lo lookup xxxx IMPLICIT_NETWORK and EXPLICIT_NETWORK rules are installed by connectivity service as a matter of course whether the network is local or not. See commit If8729fc6f3716a580c936584b851bc38000b5de5 for implementation details of this mechanic. There is no need to implement anything in particular for the new connected reason, as the current implementation will already keep it connected. A new test makes sure of that. Test: FrameworksNetTests CtsNetTestCases FrameworksNetIntegrationTests NetworkStackTests NetworkStaticLibTests TetheringTests MtsTetheringTestLatestSdk TetheringIntegrationTests Change-Id: I6fb7dfe4c232eea8cac9ac268897ddb36bb794d1
-
- Oct 12, 2023
-
-
Jean Chalard authored
* changes: Add hidden constants for communicating about local network agents Use isAtLeast* from deps
-
Motomu Utsumi authored
-
Paul Hu authored
-
Chalard Jean authored
Test: FrameworksNetTests Change-Id: Ic490fee6ee70d74acff0a290199b2946817173d0
-
Chalard Jean authored
CSTest and CSAgentWrapper need to agree on what the current version is Test: CSTest* Change-Id: If78047c36ce213a531207d25b410e870691fbb98
-
Paul Hu authored
The created handler thread will stay there for a while until all the tests are finished. This is considered as a leakage which will take the resource from the devices. In low end devices, this may possibly impact the performance. The created threads should be closed explicitly. Test: atest ConnectivityCoverageTests ConntrackSocketTest Change-Id: Ic1beb2a210e7c8c80c66fc9e0727c47599150672
-
Jean Chalard authored
* changes: Prepare exposing Network{Request,Caps}.forbiddenCapabilities Add a keep connected for test reason Improvements to CSTest : legacy type, wait for LOST, permissions
-
- Oct 11, 2023
-
-
Jihoon Kang authored
-
Hansen Kurli authored
* changes: Remove the fail case on IPv6 in testLockdownVpn Remove LockdownVpnTracker from testLegacyLockdownVpn
-
Chalard Jean authored
This is useful going forward in particular because there will be a default forbidden capability for LOCAL_NETWORKS. This means it will be useful to be able to remove it. It is also generally useful and we have been wanting to open this API to the public, so this is a good opportunity to do so. Test: new tests for NetworkRequest NetworkCapabilitiesTest already has tests because it already was @SystemApi Change-Id: Ibb8d33b799f2d274326fd9cd0b05a2c33a18032a
-
Chalard Jean authored
This has been sorely needed for a while. Instead of filing requests for each of your networks in a CSTest, which is fiddly at best and sometimes almost impossible (because you can't single out the network), you can now add this flag and be done with it. Test: CSKeepConnectedTest Change-Id: Ie168fe1f3a17de035fdf05e3d6580d3262a3448e
-
Chalard Jean authored
• Make sure all Agents have a legacy type. This is necessary to avoid crashes in LegacyNetworkTracker • Wait for LOST when disconnecting a network • Make sure the test package sees its own permissions (importantly it can't see background networks otherwise, because it lacks CHANGE_NETWORKING_STATE) Test: in the followup Change-Id: I9f699b6372a8fe0d5bcd5310d8f35f72e48a6c61
-
- Oct 10, 2023
-
-
Maciej Żenczykowski authored
Test: TreeHugger Signed-off-by:
Maciej Żenczykowski <maze@google.com> Change-Id: Id68aece26115808c2b1b795b9395208f5066f87c
-
Maciej Żenczykowski authored
* changes: netbpfload: remove netbpfload.rc netbpfload: remove support for limiting selinux contexts netbpfload: do not create /sys/fs/bpf/loader subdir type safety for 'bool downstream' type safety for 'bool updatetime'
-
Paul Duffin authored
Currently, metalava will discard concrete overrides of abstract methods from the API signature files which causes problems when attempting to generate stubs from those files and also discards information that may be important in API reviews. This change is the first step in the process of changing that behavior. This change hard codes the current behavior for discarding the concrete overrides (`add-additional-overrides=no`) into those signature files that will (or are likely) to be affected by the change in behavior. That allows the default behavior to be changed for all the other files without affecting these. Follow up changes will remove the hard coding from the signature files and will update the contents which will include the concrete overrides of the abstract methods. More information and the background for this change is available at go/add-overriding-one-pager. Test: m checkapi Bug: 299366704 Change-Id: I52c5bbe2e3bbd36019fe44fcb0b2d19876a5a869
-
Chalard Jean authored
Test: none needed Change-Id: I7e409827adc86fc13975f394100889a6bf0f1e50
-
Maciej Żenczykowski authored
I think it's better to just put this in bpfloader.rc, where we can guarantee the correct ordering. Test: TreeHugger Signed-off-by:
Maciej Żenczykowski <maze@google.com> Change-Id: Ie2c5ab1cb1de015397ac54867ae6bb0c4321d207
-
Maciej Żenczykowski authored
No need for this, as we simply only support those selinux contexts (and directories) which are available to networking. Test: TreeHugger Signed-off-by:
Maciej Żenczykowski <maze@google.com> Change-Id: I35b134c57411f82514b9f7148411f83d3aee1927
-
Maciej Żenczykowski authored
(it's already created by the platform bpfloader) Test: TreeHugger Signed-off-by:
Maciej Żenczykowski <maze@google.com> Change-Id: Ie22f585cab17fd2bded3d97a9cfe1019b792b69d
-
Maciej Żenczykowski authored
funky naming 'stream.down', because downstream.downstream is just too long... Test: TreeHugger Signed-off-by:
Maciej Żenczykowski <maze@google.com> Change-Id: Id234654fa8960e7430fc33119f36fd94b858d242
-
Maciej Żenczykowski authored
Test: TreeHugger Signed-off-by:
Maciej Żenczykowski <maze@google.com> Change-Id: I99d51524ba913c46bad64b89778c01164639c85e
-
Chalard Jean authored
Test: in followup patches Change-Id: I540ce2a455c92be52eb94fbd4b54a2081d04d25e
-
Maciej Żenczykowski authored
-
Jean Chalard authored
-
Jean Chalard authored
-
Treehugger Robot authored
* changes: netbpfload: remove support for limiting program types netbpfload: remove non-network program types netbpfload: add Android.bp file
-
Xiao Ma authored
-
- Oct 09, 2023
-
-
Elliott Hughes authored
Test: treehugger Change-Id: If699230d0bf71ce521d7175da707e42b78ae4886
-
Krzysztof Kosiński authored
-
Maciej Żenczykowski authored
* changes: type safety for is_ethernet type safety for 'bool egress'
-
Treehugger Robot authored
* changes: netd.c: factor out get_app_permissions() bpf_progs: use macros for kernel version type safety for kernel version
-
Maciej Żenczykowski authored
No need for this, as we simply only support network program types in the first place. Test: TreeHugger Signed-off-by:
Maciej Żenczykowski <maze@google.com> Change-Id: I163e21fd4d4089882cf37fc68bc4299003b514d7
-
Maciej Żenczykowski authored
We are unlikely to ever be willing to load these program types from mainline, as it is simply too dangerous. Test: TreeHugger Signed-off-by:
Maciej Żenczykowski <maze@google.com> Change-Id: I1b0943d39b8131699f4606e8d165f3c944d453ed
-
Maciej Żenczykowski authored
Test: TreeHugger Signed-off-by:
Maciej Żenczykowski <maze@google.com> Change-Id: I3af8e7f14de8dd5dd65c40705195332bef114b88
-
Maciej Żenczykowski authored
(reversing logic, as 'rawip.rawip' is much shorter then 'ethernet.ethernet') Test: TreeHugger Signed-off-by:
Maciej Żenczykowski <maze@google.com> Change-Id: Ib48cc2b889e8b587e14edbe89606f887a884af87
-
Maciej Żenczykowski authored
Test: TreeHugger Signed-off-by:
Maciej Żenczykowski <maze@google.com> Change-Id: I3f0a12f139478bc94d351d58a08d4a9bd19fa320
-
- Oct 08, 2023
-
-
Kangping Dong authored
-
Kangping Dong authored
service-connectivity-mdns-standalone-build-test builds the mDNS discovery and advertisement implementation against API level 21. This stops the advertisement code from calling new NsdServiceInfo public or private APIs which are required by Thread. This commit removes the mDNS advertisement code from the standalone build to loose the check given this will never be used by GMS Core. Bug: 265095929 Test: verified that it can build with aosp/2608627 Change-Id: I32cfce7b994d51a4b4ec468e9f79ffc2be6635ff
-