LeOS-GSI/patches/LeOS-V/leos/platform_packages_modules_C.../1002-dnscheck.grapheneos.patch

592 lines
31 KiB
Diff

From d0602c6f0d445b6d6af220b82a8473d85593b117 Mon Sep 17 00:00:00 2001
From: harvey186 <harvey186@hotmail.com>
Date: Thu, 12 Dec 2024 11:25:22 +0100
Subject: [PATCH] 1002-dnscheck.grapheneos
Change-Id: Ibf4c73929f77ca6026cc1391189b5c1e48c98ec5
---
1002-dnscheck.grapheneos.patch | 174 +-----------------
.../connectivity/NetworkDiagnostics.java | 78 +++++++-
.../com/android/cts/net/hostside/VpnTest.java | 4 +-
tests/cts/net/jni/NativeMultinetworkJni.cpp | 2 +-
.../cts/net/native/dns/NativeDnsAsyncTest.cpp | 8 +-
.../src/android/net/cts/DnsResolverTest.java | 2 +-
.../server/connectivity/DnsManagerTest.java | 44 ++---
7 files changed, 100 insertions(+), 212 deletions(-)
diff --git a/1002-dnscheck.grapheneos.patch b/1002-dnscheck.grapheneos.patch
index 82d0747..7743b60 100644
--- a/1002-dnscheck.grapheneos.patch
+++ b/1002-dnscheck.grapheneos.patch
@@ -227,179 +227,7 @@ index 752891f..63e9c04 100644
static final String INVALID_PRIVATE_DNS_SERVER = "invalid.google";
static final String GOOGLE_PRIVATE_DNS_SERVER = "dns.google";
static final byte[] TEST_BLOB = new byte[]{
-diff --git a/tests/unit/java/com/android/server/connectivity/DnsManagerTest.java b/tests/unit/java/com/android/server/connectivity/DnsManagerTest.java
-index ea3d2dd..1757b2e 100644
---- a/tests/unit/java/com/android/server/connectivity/DnsManagerTest.java
-+++ b/tests/unit/java/com/android/server/connectivity/DnsManagerTest.java
-@@ -142,8 +142,8 @@ public class DnsManagerTest {
- mDnsManager.getPrivateDnsConfig());
- LinkProperties lp = new LinkProperties();
- lp.setInterfaceName(TEST_IFACENAME);
-- lp.addDnsServer(InetAddress.getByName("3.3.3.3"));
-- lp.addDnsServer(InetAddress.getByName("4.4.4.4"));
-+ lp.addDnsServer(InetAddress.getByName("9.9.9.9"));
-+ lp.addDnsServer(InetAddress.getByName("9.9.9.9"));
-
- // Send a validation event that is tracked on the alternate netId
- final NetworkCapabilities nc = new NetworkCapabilities();
-@@ -156,7 +156,7 @@ public class DnsManagerTest {
- mDnsManager.flushVmDnsCache();
- mDnsManager.updatePrivateDnsValidation(
- new DnsManager.PrivateDnsValidationUpdate(TEST_NETID_ALTERNATE,
-- InetAddress.parseNumericAddress("4.4.4.4"), "",
-+ InetAddress.parseNumericAddress("9.9.9.9"), "",
- VALIDATION_RESULT_SUCCESS));
- LinkProperties fixedLp = new LinkProperties(lp);
- mDnsManager.updatePrivateDnsStatus(TEST_NETID, fixedLp);
-@@ -166,7 +166,7 @@ public class DnsManagerTest {
- mDnsManager.updatePrivateDnsStatus(TEST_NETID_ALTERNATE, fixedLp);
- assertTrue(fixedLp.isPrivateDnsActive());
- assertNull(fixedLp.getPrivateDnsServerName());
-- assertEquals(Arrays.asList(InetAddress.getByName("4.4.4.4")),
-+ assertEquals(Arrays.asList(InetAddress.getByName("9.9.9.9")),
- fixedLp.getValidatedPrivateDnsServers());
-
- // Set up addresses for strict mode and switch to it.
-@@ -181,7 +181,7 @@ public class DnsManagerTest {
- ConnectivitySettingsManager.setPrivateDnsHostname(mCtx, "strictmode.com");
- mDnsManager.updatePrivateDns(new Network(TEST_NETID),
- new PrivateDnsConfig("strictmode.com", new InetAddress[] {
-- InetAddress.parseNumericAddress("6.6.6.6"),
-+ InetAddress.parseNumericAddress("9.9.9.9"),
- InetAddress.parseNumericAddress("2001:db8:66:66::1")
- }));
- mDnsManager.updateCapabilitiesForNetwork(TEST_NETID, nc);
-@@ -196,11 +196,11 @@ public class DnsManagerTest {
- // Validate one.
- mDnsManager.updatePrivateDnsValidation(
- new DnsManager.PrivateDnsValidationUpdate(TEST_NETID,
-- InetAddress.parseNumericAddress("6.6.6.6"), "strictmode.com",
-+ InetAddress.parseNumericAddress("9.9.9.9"), "strictmode.com",
- VALIDATION_RESULT_SUCCESS));
- fixedLp = new LinkProperties(lp);
- mDnsManager.updatePrivateDnsStatus(TEST_NETID, fixedLp);
-- assertEquals(Arrays.asList(InetAddress.parseNumericAddress("6.6.6.6")),
-+ assertEquals(Arrays.asList(InetAddress.parseNumericAddress("9.9.9.9")),
- fixedLp.getValidatedPrivateDnsServers());
- // Validate the 2nd one.
- mDnsManager.updatePrivateDnsValidation(
-@@ -211,7 +211,7 @@ public class DnsManagerTest {
- mDnsManager.updatePrivateDnsStatus(TEST_NETID, fixedLp);
- assertEquals(Arrays.asList(
- InetAddress.parseNumericAddress("2001:db8:66:66::1"),
-- InetAddress.parseNumericAddress("6.6.6.6")),
-+ InetAddress.parseNumericAddress("9.9.9.9")),
- fixedLp.getValidatedPrivateDnsServers());
- }
-
-@@ -220,7 +220,7 @@ public class DnsManagerTest {
- // The PrivateDnsConfig map is empty, so no validation events will
- // be tracked.
- LinkProperties lp = new LinkProperties();
-- lp.addDnsServer(InetAddress.getByName("3.3.3.3"));
-+ lp.addDnsServer(InetAddress.getByName("9.9.9.9"));
- final NetworkCapabilities nc = new NetworkCapabilities();
- nc.setTransportTypes(TEST_TRANSPORT_TYPES);
- mDnsManager.updateCapabilitiesForNetwork(TEST_NETID, nc);
-@@ -228,7 +228,7 @@ public class DnsManagerTest {
- mDnsManager.flushVmDnsCache();
- mDnsManager.updatePrivateDnsValidation(
- new DnsManager.PrivateDnsValidationUpdate(TEST_NETID,
-- InetAddress.parseNumericAddress("3.3.3.3"), "",
-+ InetAddress.parseNumericAddress("9.9.9.9"), "",
- VALIDATION_RESULT_SUCCESS));
- mDnsManager.updatePrivateDnsStatus(TEST_NETID, lp);
- assertFalse(lp.isPrivateDnsActive());
-@@ -242,7 +242,7 @@ public class DnsManagerTest {
- mDnsManager.flushVmDnsCache();
- mDnsManager.updatePrivateDnsValidation(
- new DnsManager.PrivateDnsValidationUpdate(TEST_NETID_UNTRACKED,
-- InetAddress.parseNumericAddress("3.3.3.3"), "",
-+ InetAddress.parseNumericAddress("9.9.9.9"), "",
- VALIDATION_RESULT_SUCCESS));
- mDnsManager.updatePrivateDnsStatus(TEST_NETID, lp);
- assertFalse(lp.isPrivateDnsActive());
-@@ -251,7 +251,7 @@ public class DnsManagerTest {
- // Validation event has untracked ipAddress
- mDnsManager.updatePrivateDnsValidation(
- new DnsManager.PrivateDnsValidationUpdate(TEST_NETID,
-- InetAddress.parseNumericAddress("4.4.4.4"), "",
-+ InetAddress.parseNumericAddress("9.9.9.9"), "",
- VALIDATION_RESULT_SUCCESS));
- mDnsManager.updatePrivateDnsStatus(TEST_NETID, lp);
- assertFalse(lp.isPrivateDnsActive());
-@@ -260,7 +260,7 @@ public class DnsManagerTest {
- // Validation event has untracked hostname
- mDnsManager.updatePrivateDnsValidation(
- new DnsManager.PrivateDnsValidationUpdate(TEST_NETID,
-- InetAddress.parseNumericAddress("3.3.3.3"), "hostname",
-+ InetAddress.parseNumericAddress("9.9.9.9"), "hostname",
- VALIDATION_RESULT_SUCCESS));
- mDnsManager.updatePrivateDnsStatus(TEST_NETID, lp);
- assertFalse(lp.isPrivateDnsActive());
-@@ -269,7 +269,7 @@ public class DnsManagerTest {
- // Validation event failed
- mDnsManager.updatePrivateDnsValidation(
- new DnsManager.PrivateDnsValidationUpdate(TEST_NETID,
-- InetAddress.parseNumericAddress("3.3.3.3"), "",
-+ InetAddress.parseNumericAddress("9.9.9.9"), "",
- VALIDATION_RESULT_FAILURE));
- mDnsManager.updatePrivateDnsStatus(TEST_NETID, lp);
- assertFalse(lp.isPrivateDnsActive());
-@@ -279,7 +279,7 @@ public class DnsManagerTest {
- mDnsManager.removeNetwork(new Network(TEST_NETID));
- mDnsManager.updatePrivateDnsValidation(
- new DnsManager.PrivateDnsValidationUpdate(TEST_NETID,
-- InetAddress.parseNumericAddress("3.3.3.3"), "", VALIDATION_RESULT_SUCCESS));
-+ InetAddress.parseNumericAddress("9.9.9.9"), "", VALIDATION_RESULT_SUCCESS));
- mDnsManager.updatePrivateDnsStatus(TEST_NETID, lp);
- assertFalse(lp.isPrivateDnsActive());
- assertNull(lp.getPrivateDnsServerName());
-@@ -293,7 +293,7 @@ public class DnsManagerTest {
- mDnsManager.flushVmDnsCache();
- mDnsManager.updatePrivateDnsValidation(
- new DnsManager.PrivateDnsValidationUpdate(TEST_NETID,
-- InetAddress.parseNumericAddress("3.3.3.3"), "",
-+ InetAddress.parseNumericAddress("9.9.9.9"), "",
- VALIDATION_RESULT_SUCCESS));
- mDnsManager.updatePrivateDnsStatus(TEST_NETID, lp);
- assertFalse(lp.isPrivateDnsActive());
-@@ -331,8 +331,8 @@ public class DnsManagerTest {
- mDnsManager.getPrivateDnsConfig());
- final LinkProperties lp = new LinkProperties();
- lp.setInterfaceName(TEST_IFACENAME);
-- lp.addDnsServer(InetAddress.getByName("3.3.3.3"));
-- lp.addDnsServer(InetAddress.getByName("4.4.4.4"));
-+ lp.addDnsServer(InetAddress.getByName("9.9.9.9"));
-+ lp.addDnsServer(InetAddress.getByName("9.9.9.9"));
- final NetworkCapabilities nc = new NetworkCapabilities();
- nc.setTransportTypes(TEST_TRANSPORT_TYPES);
- mDnsManager.updateCapabilitiesForNetwork(TEST_NETID, nc);
-@@ -345,10 +345,10 @@ public class DnsManagerTest {
- expectedParams.successThreshold = TEST_DEFAULT_SUCCESS_THRESHOLD_PERCENT;
- expectedParams.minSamples = TEST_DEFAULT_MIN_SAMPLES;
- expectedParams.maxSamples = TEST_DEFAULT_MAX_SAMPLES;
-- expectedParams.servers = new String[]{"3.3.3.3", "4.4.4.4"};
-+ expectedParams.servers = new String[]{"9.9.9.9", "9.9.9.9"};
- expectedParams.domains = new String[]{};
- expectedParams.tlsName = "";
-- expectedParams.tlsServers = new String[]{"3.3.3.3", "4.4.4.4"};
-+ expectedParams.tlsServers = new String[]{"9.9.9.9", "9.9.9.9"};
- expectedParams.transportTypes = TEST_TRANSPORT_TYPES;
- expectedParams.resolverOptions = null;
- expectedParams.meteredNetwork = true;
-@@ -379,9 +379,9 @@ public class DnsManagerTest {
- @Test
- public void testGetPrivateDnsConfigForNetwork() throws Exception {
- final Network network = new Network(TEST_NETID);
-- final InetAddress dnsAddr = InetAddressUtils.parseNumericAddress("3.3.3.3");
-+ final InetAddress dnsAddr = InetAddressUtils.parseNumericAddress("9.9.9.9");
- final InetAddress[] tlsAddrs = new InetAddress[]{
-- InetAddressUtils.parseNumericAddress("6.6.6.6"),
-+ InetAddressUtils.parseNumericAddress("9.9.9.9"),
- InetAddressUtils.parseNumericAddress("2001:db8:66:66::1")
- };
- final String tlsName = "strictmode.com";
+
--
2.34.1
diff --git a/service/src/com/android/server/connectivity/NetworkDiagnostics.java b/service/src/com/android/server/connectivity/NetworkDiagnostics.java
index 8a2e72c..747493d 100644
--- a/service/src/com/android/server/connectivity/NetworkDiagnostics.java
+++ b/service/src/com/android/server/connectivity/NetworkDiagnostics.java
@@ -30,6 +30,7 @@ import static com.android.net.module.util.NetworkStackConstants.IP_MTU;
import android.annotation.NonNull;
import android.annotation.Nullable;
import android.annotation.TargetApi;
+
import android.net.InetAddresses;
import android.net.LinkAddress;
import android.net.LinkProperties;
@@ -109,9 +110,9 @@ import javax.net.ssl.SSLSocketFactory;
public class NetworkDiagnostics {
private static final String TAG = "NetworkDiagnostics";
- private static final InetAddress TEST_DNS4 = InetAddresses.parseNumericAddress("8.8.8.8");
+ private static final InetAddress TEST_DNS4 = InetAddresses.parseNumericAddress("1.1.1.1");
private static final InetAddress TEST_DNS6 = InetAddresses.parseNumericAddress(
- "2001:4860:4860::8888");
+ "2606:4700:4700::1001");
// For brevity elsewhere.
private static final long now() {
@@ -704,10 +705,9 @@ public class NetworkDiagnostics {
// This needs to be fixed length so it can be dropped into the pre-canned packet.
final String sixRandomDigits = String.valueOf(mRandom.nextInt(900000) + 100000);
- appendDnsToMeasurementDescription(sixRandomDigits, mSocketAddress);
-
// Build a trivial DNS packet.
final byte[] dnsPacket = getDnsQueryPacket(sixRandomDigits);
+ appendDnsToMeasurementDescription(sixRandomDigits, mSocketAddress);
int count = 0;
mMeasurement.startTime = now();
@@ -741,9 +741,12 @@ public class NetworkDiagnostics {
close();
}
+ private String qnameEnding;
+
protected byte[] getDnsQueryPacket(String sixRandomDigits) {
byte[] rnd = sixRandomDigits.getBytes(StandardCharsets.US_ASCII);
- return new byte[] {
+
+ byte[] start = {
(byte) mRandom.nextInt(), (byte) mRandom.nextInt(), // [0-1] query ID
1, 0, // [2-3] flags; byte[2] = 1 for recursion desired (RD).
0, 1, // [4-5] QDCOUNT (number of queries)
@@ -752,20 +755,77 @@ public class NetworkDiagnostics {
0, 0, // [10-11] ARCOUNT (number of additional records)
17, rnd[0], rnd[1], rnd[2], rnd[3], rnd[4], rnd[5],
'-', 'a', 'n', 'd', 'r', 'o', 'i', 'd', '-', 'd', 's',
- 6, 'm', 'e', 't', 'r', 'i', 'c',
- 7, 'g', 's', 't', 'a', 't', 'i', 'c',
- 3, 'c', 'o', 'm',
+ };
+
+ final String qnameEnding;
+ qnameEnding = "dnscheck.grapheneos.org";
+
+ this.qnameEnding = qnameEnding;
+ byte[] middle = getQnameFragment(qnameEnding);
+
+ byte[] end = {
0, // null terminator of FQDN (root TLD)
0, (byte) mQueryType, // QTYPE
0, 1 // QCLASS, set to 1 = IN (Internet)
};
+
+ return concatByteArrays(start, middle, end);
+ }
+
+ private byte[] concatByteArrays(byte[]... arrs) {
+ int len = 0;
+ for (byte[] arr : arrs) {
+ if (Integer.MAX_VALUE - len < arr.length) {
+ // overflow
+ throw new IllegalArgumentException();
+ }
+ len += arr.length;
+ }
+ byte[] res = new byte[len];
+ int off = 0;
+ for (byte[] arr : arrs) {
+ int l = arr.length;
+ System.arraycopy(arr, 0, res, off, l);
+ off += l;
+ }
+ return res;
+ }
+
+ protected byte[] getQnameFragment(String hostnameFragment) {
+ String[] strArr = hostnameFragment.split("\\.");
+ int len = strArr.length;
+ byte[][] arr = new byte[len][];
+ for (int i = 0; i < len; ++i) {
+ arr[i] = getQnameLabel(strArr[i]);
+ }
+ return concatByteArrays(arr);
+ }
+
+ private byte[] getQnameLabel(String s) {
+ final int l = s.length();
+ if (l > 0b11_1111 /* 63 */) {
+ // should be a 6 bit number
+ throw new IllegalArgumentException(s);
+ }
+
+ byte[] res = new byte[1 + l];
+ res[0] = (byte) l;
+
+ for (int i = 0; i < l; ++i) {
+ int ch = s.charAt(i);
+ if (ch > 0x7f) {
+ throw new IllegalArgumentException(s);
+ }
+ res[1 + i] = (byte) ch;
+ }
+ return res;
}
protected void appendDnsToMeasurementDescription(
String sixRandomDigits, SocketAddress sockAddr) {
mMeasurement.description += " src{" + socketAddressToString(sockAddr) + "}"
+ " qtype{" + mQueryType + "}"
- + " qname{" + sixRandomDigits + "-android-ds.metric.gstatic.com}";
+ + " qname{" + sixRandomDigits + "-android-ds." + qnameEnding + "}";
}
}
diff --git a/tests/cts/hostside/app/src/com/android/cts/net/hostside/VpnTest.java b/tests/cts/hostside/app/src/com/android/cts/net/hostside/VpnTest.java
index 985cf5b..32cb3c2 100755
--- a/tests/cts/hostside/app/src/com/android/cts/net/hostside/VpnTest.java
+++ b/tests/cts/hostside/app/src/com/android/cts/net/hostside/VpnTest.java
@@ -835,7 +835,7 @@ public class VpnTest {
String privateDnsHostname;
if (strictMode) {
- privateDnsHostname = "vpncts-nx.metric.gstatic.com";
+ privateDnsHostname = "vpncts-nx.dnscheck.grapheneos.org";
Settings.Global.putString(cr, PRIVATE_DNS_SPECIFIER_SETTING, privateDnsHostname);
Settings.Global.putString(cr, PRIVATE_DNS_MODE_SETTING,
PRIVATE_DNS_MODE_PROVIDER_HOSTNAME);
@@ -846,7 +846,7 @@ public class VpnTest {
expectPrivateDnsHostname(privateDnsHostname);
- String randomName = "vpncts-" + new Random().nextInt(1000000000) + "-ds.metric.gstatic.com";
+ String randomName = "vpncts-" + new Random().nextInt(1000000000) + "-ds.dnscheck.grapheneos.org";
if (strictMode) {
// Strict mode private DNS is enabled. DNS lookups should fail, because the private DNS
// server name is invalid.
diff --git a/tests/cts/net/jni/NativeMultinetworkJni.cpp b/tests/cts/net/jni/NativeMultinetworkJni.cpp
index f2214a3..d971cbf 100644
--- a/tests/cts/net/jni/NativeMultinetworkJni.cpp
+++ b/tests/cts/net/jni/NativeMultinetworkJni.cpp
@@ -81,7 +81,7 @@
static const int MAXPACKET = 8 * 1024;
static const int TIMEOUT_MS = 15000;
static const char kHostname[] = "connectivitycheck.android.com";
-static const char kNxDomainName[] = "test1-nx.metric.gstatic.com";
+static const char kNxDomainName[] = "test1-nx.dnscheck.grapheneos.org";
static const char kGoogleName[] = "www.google.com";
int makeQuery(const char* name, int qtype, uint8_t* buf, size_t buflen) {
diff --git a/tests/cts/net/native/dns/NativeDnsAsyncTest.cpp b/tests/cts/net/native/dns/NativeDnsAsyncTest.cpp
index 68bd227..9d676ba 100644
--- a/tests/cts/net/native/dns/NativeDnsAsyncTest.cpp
+++ b/tests/cts/net/native/dns/NativeDnsAsyncTest.cpp
@@ -167,13 +167,13 @@ TEST_F(NativeDnsAsyncTest, Async_Send) {
TEST_F(NativeDnsAsyncTest, Async_NXDOMAIN) {
uint8_t buf[MAXPACKET] = {};
- int len = res_mkquery(ns_o_query, "test1-nx.metric.gstatic.com",
+ int len = res_mkquery(ns_o_query, "test1-nx.dnscheck.grapheneos.org",
ns_c_in, ns_t_a, nullptr, 0, nullptr, buf, sizeof(buf));
EXPECT_GT(len, 0);
int fd1 = android_res_nsend(NETWORK_UNSPECIFIED, buf, len, ANDROID_RESOLV_NO_CACHE_LOOKUP);
EXPECT_GE(fd1, 0);
- len = res_mkquery(ns_o_query, "test2-nx.metric.gstatic.com",
+ len = res_mkquery(ns_o_query, "test2-nx.dnscheck.grapheneos.org",
ns_c_in, ns_t_a, nullptr, 0, nullptr, buf, sizeof(buf));
EXPECT_GT(len, 0);
int fd2 = android_res_nsend(NETWORK_UNSPECIFIED, buf, len, ANDROID_RESOLV_NO_CACHE_LOOKUP);
@@ -183,11 +183,11 @@ TEST_F(NativeDnsAsyncTest, Async_NXDOMAIN) {
expectAnswersValid(fd1, AF_INET, ns_r_nxdomain);
fd1 = android_res_nquery(
- NETWORK_UNSPECIFIED, "test3-nx.metric.gstatic.com",
+ NETWORK_UNSPECIFIED, "test3-nx.dnscheck.grapheneos.org",
ns_c_in, ns_t_aaaa, ANDROID_RESOLV_NO_CACHE_LOOKUP);
EXPECT_GE(fd1, 0);
fd2 = android_res_nquery(
- NETWORK_UNSPECIFIED, "test4-nx.metric.gstatic.com",
+ NETWORK_UNSPECIFIED, "test4-nx.dnscheck.grapheneos.org",
ns_c_in, ns_t_aaaa, ANDROID_RESOLV_NO_CACHE_LOOKUP);
EXPECT_GE(fd2, 0);
expectAnswersValid(fd2, AF_INET6, ns_r_nxdomain);
diff --git a/tests/cts/net/src/android/net/cts/DnsResolverTest.java b/tests/cts/net/src/android/net/cts/DnsResolverTest.java
index fa44ae9..8001e9e 100644
--- a/tests/cts/net/src/android/net/cts/DnsResolverTest.java
+++ b/tests/cts/net/src/android/net/cts/DnsResolverTest.java
@@ -95,7 +95,7 @@ public class DnsResolverTest {
};
static final String TEST_DOMAIN = "www.google.com";
- static final String TEST_NX_DOMAIN = "test1-nx.metric.gstatic.com";
+ static final String TEST_NX_DOMAIN = "test1-nx.dnscheck.grapheneos.org";
static final String INVALID_PRIVATE_DNS_SERVER = "invalid.google";
static final String GOOGLE_PRIVATE_DNS_SERVER = "dns.google";
static final byte[] TEST_BLOB = new byte[]{
diff --git a/tests/unit/java/com/android/server/connectivity/DnsManagerTest.java b/tests/unit/java/com/android/server/connectivity/DnsManagerTest.java
index fb3004a..50d20bb 100644
--- a/tests/unit/java/com/android/server/connectivity/DnsManagerTest.java
+++ b/tests/unit/java/com/android/server/connectivity/DnsManagerTest.java
@@ -143,8 +143,8 @@ public class DnsManagerTest {
mDnsManager.getPrivateDnsConfig());
LinkProperties lp = new LinkProperties();
lp.setInterfaceName(TEST_IFACENAME);
- lp.addDnsServer(InetAddress.getByName("3.3.3.3"));
- lp.addDnsServer(InetAddress.getByName("4.4.4.4"));
+ lp.addDnsServer(InetAddress.getByName("9.9.9.9"));
+ lp.addDnsServer(InetAddress.getByName("9.9.9.9"));
// Send a validation event that is tracked on the alternate netId
final NetworkCapabilities nc = new NetworkCapabilities();
@@ -157,7 +157,7 @@ public class DnsManagerTest {
mDnsManager.flushVmDnsCache();
mDnsManager.updatePrivateDnsValidation(
new DnsManager.PrivateDnsValidationUpdate(TEST_NETID_ALTERNATE,
- InetAddress.parseNumericAddress("4.4.4.4"), "",
+ InetAddress.parseNumericAddress("9.9.9.9"), "",
VALIDATION_RESULT_SUCCESS));
LinkProperties fixedLp = new LinkProperties(lp);
mDnsManager.updatePrivateDnsStatus(TEST_NETID, fixedLp);
@@ -167,7 +167,7 @@ public class DnsManagerTest {
mDnsManager.updatePrivateDnsStatus(TEST_NETID_ALTERNATE, fixedLp);
assertTrue(fixedLp.isPrivateDnsActive());
assertNull(fixedLp.getPrivateDnsServerName());
- assertEquals(Arrays.asList(InetAddress.getByName("4.4.4.4")),
+ assertEquals(Arrays.asList(InetAddress.getByName("9.9.9.9")),
fixedLp.getValidatedPrivateDnsServers());
// Set up addresses for strict mode and switch to it.
@@ -182,7 +182,7 @@ public class DnsManagerTest {
ConnectivitySettingsManager.setPrivateDnsHostname(mCtx, "strictmode.com");
mDnsManager.updatePrivateDns(new Network(TEST_NETID),
new PrivateDnsConfig("strictmode.com", new InetAddress[] {
- InetAddress.parseNumericAddress("6.6.6.6"),
+ InetAddress.parseNumericAddress("9.9.9.9"),
InetAddress.parseNumericAddress("2001:db8:66:66::1")
}));
mDnsManager.updateCapabilitiesForNetwork(TEST_NETID, nc);
@@ -197,11 +197,11 @@ public class DnsManagerTest {
// Validate one.
mDnsManager.updatePrivateDnsValidation(
new DnsManager.PrivateDnsValidationUpdate(TEST_NETID,
- InetAddress.parseNumericAddress("6.6.6.6"), "strictmode.com",
+ InetAddress.parseNumericAddress("9.9.9.9"), "strictmode.com",
VALIDATION_RESULT_SUCCESS));
fixedLp = new LinkProperties(lp);
mDnsManager.updatePrivateDnsStatus(TEST_NETID, fixedLp);
- assertEquals(Arrays.asList(InetAddress.parseNumericAddress("6.6.6.6")),
+ assertEquals(Arrays.asList(InetAddress.parseNumericAddress("9.9.9.9")),
fixedLp.getValidatedPrivateDnsServers());
// Validate the 2nd one.
mDnsManager.updatePrivateDnsValidation(
@@ -212,7 +212,7 @@ public class DnsManagerTest {
mDnsManager.updatePrivateDnsStatus(TEST_NETID, fixedLp);
assertEquals(Arrays.asList(
InetAddress.parseNumericAddress("2001:db8:66:66::1"),
- InetAddress.parseNumericAddress("6.6.6.6")),
+ InetAddress.parseNumericAddress("9.9.9.9")),
fixedLp.getValidatedPrivateDnsServers());
}
@@ -221,7 +221,7 @@ public class DnsManagerTest {
// The PrivateDnsConfig map is empty, so no validation events will
// be tracked.
LinkProperties lp = new LinkProperties();
- lp.addDnsServer(InetAddress.getByName("3.3.3.3"));
+ lp.addDnsServer(InetAddress.getByName("9.9.9.9"));
final NetworkCapabilities nc = new NetworkCapabilities();
nc.setTransportTypes(TEST_TRANSPORT_TYPES);
mDnsManager.updateCapabilitiesForNetwork(TEST_NETID, nc);
@@ -229,7 +229,7 @@ public class DnsManagerTest {
mDnsManager.flushVmDnsCache();
mDnsManager.updatePrivateDnsValidation(
new DnsManager.PrivateDnsValidationUpdate(TEST_NETID,
- InetAddress.parseNumericAddress("3.3.3.3"), "",
+ InetAddress.parseNumericAddress("9.9.9.9"), "",
VALIDATION_RESULT_SUCCESS));
mDnsManager.updatePrivateDnsStatus(TEST_NETID, lp);
assertFalse(lp.isPrivateDnsActive());
@@ -243,7 +243,7 @@ public class DnsManagerTest {
mDnsManager.flushVmDnsCache();
mDnsManager.updatePrivateDnsValidation(
new DnsManager.PrivateDnsValidationUpdate(TEST_NETID_UNTRACKED,
- InetAddress.parseNumericAddress("3.3.3.3"), "",
+ InetAddress.parseNumericAddress("9.9.9.9"), "",
VALIDATION_RESULT_SUCCESS));
mDnsManager.updatePrivateDnsStatus(TEST_NETID, lp);
assertFalse(lp.isPrivateDnsActive());
@@ -252,7 +252,7 @@ public class DnsManagerTest {
// Validation event has untracked ipAddress
mDnsManager.updatePrivateDnsValidation(
new DnsManager.PrivateDnsValidationUpdate(TEST_NETID,
- InetAddress.parseNumericAddress("4.4.4.4"), "",
+ InetAddress.parseNumericAddress("9.9.9.9"), "",
VALIDATION_RESULT_SUCCESS));
mDnsManager.updatePrivateDnsStatus(TEST_NETID, lp);
assertFalse(lp.isPrivateDnsActive());
@@ -261,7 +261,7 @@ public class DnsManagerTest {
// Validation event has untracked hostname
mDnsManager.updatePrivateDnsValidation(
new DnsManager.PrivateDnsValidationUpdate(TEST_NETID,
- InetAddress.parseNumericAddress("3.3.3.3"), "hostname",
+ InetAddress.parseNumericAddress("9.9.9.9"), "hostname",
VALIDATION_RESULT_SUCCESS));
mDnsManager.updatePrivateDnsStatus(TEST_NETID, lp);
assertFalse(lp.isPrivateDnsActive());
@@ -270,7 +270,7 @@ public class DnsManagerTest {
// Validation event failed
mDnsManager.updatePrivateDnsValidation(
new DnsManager.PrivateDnsValidationUpdate(TEST_NETID,
- InetAddress.parseNumericAddress("3.3.3.3"), "",
+ InetAddress.parseNumericAddress("9.9.9.9"), "",
VALIDATION_RESULT_FAILURE));
mDnsManager.updatePrivateDnsStatus(TEST_NETID, lp);
assertFalse(lp.isPrivateDnsActive());
@@ -280,7 +280,7 @@ public class DnsManagerTest {
mDnsManager.removeNetwork(new Network(TEST_NETID));
mDnsManager.updatePrivateDnsValidation(
new DnsManager.PrivateDnsValidationUpdate(TEST_NETID,
- InetAddress.parseNumericAddress("3.3.3.3"), "", VALIDATION_RESULT_SUCCESS));
+ InetAddress.parseNumericAddress("9.9.9.9"), "", VALIDATION_RESULT_SUCCESS));
mDnsManager.updatePrivateDnsStatus(TEST_NETID, lp);
assertFalse(lp.isPrivateDnsActive());
assertNull(lp.getPrivateDnsServerName());
@@ -294,7 +294,7 @@ public class DnsManagerTest {
mDnsManager.flushVmDnsCache();
mDnsManager.updatePrivateDnsValidation(
new DnsManager.PrivateDnsValidationUpdate(TEST_NETID,
- InetAddress.parseNumericAddress("3.3.3.3"), "",
+ InetAddress.parseNumericAddress("9.9.9.9"), "",
VALIDATION_RESULT_SUCCESS));
mDnsManager.updatePrivateDnsStatus(TEST_NETID, lp);
assertFalse(lp.isPrivateDnsActive());
@@ -331,8 +331,8 @@ public class DnsManagerTest {
mDnsManager.updatePrivateDns(new Network(TEST_NETID), cfg);
final LinkProperties lp = new LinkProperties();
lp.setInterfaceName(TEST_IFACENAME);
- lp.addDnsServer(InetAddress.getByName("3.3.3.3"));
- lp.addDnsServer(InetAddress.getByName("4.4.4.4"));
+ lp.addDnsServer(InetAddress.getByName("9.9.9.9"));
+ lp.addDnsServer(InetAddress.getByName("9.9.9.9"));
final NetworkCapabilities nc = new NetworkCapabilities();
nc.setTransportTypes(TEST_TRANSPORT_TYPES);
mDnsManager.updateCapabilitiesForNetwork(TEST_NETID, nc);
@@ -345,10 +345,10 @@ public class DnsManagerTest {
expectedParams.successThreshold = TEST_DEFAULT_SUCCESS_THRESHOLD_PERCENT;
expectedParams.minSamples = TEST_DEFAULT_MIN_SAMPLES;
expectedParams.maxSamples = TEST_DEFAULT_MAX_SAMPLES;
- expectedParams.servers = new String[]{"3.3.3.3", "4.4.4.4"};
+ expectedParams.servers = new String[]{"9.9.9.9", "9.9.9.9"};
expectedParams.domains = new String[]{};
expectedParams.tlsName = "";
- expectedParams.tlsServers = new String[]{"3.3.3.3", "4.4.4.4"};
+ expectedParams.tlsServers = new String[]{"9.9.9.9", "9.9.9.9"};
expectedParams.transportTypes = TEST_TRANSPORT_TYPES;
expectedParams.resolverOptions = null;
expectedParams.meteredNetwork = true;
@@ -430,9 +430,9 @@ public class DnsManagerTest {
@Test
public void testGetPrivateDnsConfigForNetwork() throws Exception {
final Network network = new Network(TEST_NETID);
- final InetAddress dnsAddr = InetAddressUtils.parseNumericAddress("3.3.3.3");
+ final InetAddress dnsAddr = InetAddressUtils.parseNumericAddress("9.9.9.9");
final InetAddress[] tlsAddrs = new InetAddress[]{
- InetAddressUtils.parseNumericAddress("6.6.6.6"),
+ InetAddressUtils.parseNumericAddress("9.9.9.9"),
InetAddressUtils.parseNumericAddress("2001:db8:66:66::1")
};
final String tlsName = "strictmode.com";
--
2.34.1