blob: 888a92b45a060c68400ff12700f11b59fac4ffde [file] [edit]
// Copyright 2020 The ChromiumOS Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "patchpanel/dbus/fake_client.h"
namespace patchpanel {
void FakeClient::RegisterOnAvailableCallback(
base::RepeatingCallback<void(bool)> callback) {}
void FakeClient::RegisterProcessChangedCallback(
base::RepeatingCallback<void(bool)> callback) {}
bool FakeClient::NotifyArcStartup(pid_t) {
return true;
}
bool FakeClient::NotifyArcShutdown() {
return true;
}
std::vector<Client::VirtualDevice> FakeClient::NotifyArcVmStartup(
uint32_t cid) {
return {};
}
bool FakeClient::NotifyArcVmShutdown(uint32_t cid) {
return true;
}
bool FakeClient::NotifyTerminaVmStartup(uint32_t cid,
Client::VirtualDevice* device,
Client::IPv4Subnet* container_subnet) {
return true;
}
bool FakeClient::NotifyTerminaVmShutdown(uint32_t cid) {
return true;
}
bool FakeClient::NotifyPluginVmStartup(uint64_t vm_id,
int subnet_index,
Client::VirtualDevice* device) {
return true;
}
bool FakeClient::NotifyPluginVmShutdown(uint64_t vm_id) {
return true;
}
bool FakeClient::DefaultVpnRouting(int socket) {
return true;
}
bool FakeClient::RouteOnVpn(int socket) {
return true;
}
bool FakeClient::BypassVpn(int socket) {
return true;
}
std::pair<base::ScopedFD, Client::ConnectedNamespace>
FakeClient::ConnectNamespace(pid_t pid,
const std::string& outbound_ifname,
bool forward_user_traffic,
bool route_on_vpn,
Client::TrafficSource traffic_source) {
return {};
}
void FakeClient::GetTrafficCounters(const std::set<std::string>& devices,
GetTrafficCountersCallback callback) {
if (devices.size() == 0) {
std::move(callback).Run(
{stored_traffic_counters_.begin(), stored_traffic_counters_.end()});
return;
}
std::vector<Client::TrafficCounter> return_counters;
for (const auto& counter : stored_traffic_counters_) {
if (devices.find(counter.ifname) != devices.end())
return_counters.push_back(counter);
}
std::move(callback).Run({return_counters.begin(), return_counters.end()});
}
bool FakeClient::ModifyPortRule(Client::FirewallRequestOperation op,
Client::FirewallRequestType type,
Client::FirewallRequestProtocol proto,
const std::string& input_ifname,
const std::string& input_dst_ip,
uint32_t input_dst_port,
const std::string& dst_ip,
uint32_t dst_port) {
return true;
}
bool FakeClient::SetVpnLockdown(bool enable) {
return true;
}
base::ScopedFD FakeClient::RedirectDns(
Client::DnsRedirectionRequestType type,
const std::string& input_ifname,
const std::string& proxy_address,
const std::vector<std::string>& nameservers,
const std::string& host_ifname) {
return {};
}
std::vector<Client::VirtualDevice> FakeClient::GetDevices() {
return {};
}
void FakeClient::RegisterVirtualDeviceEventHandler(
VirtualDeviceEventHandler handler) {
virtual_device_event_handlers_ = handler;
}
void FakeClient::RegisterNeighborReachabilityEventHandler(
NeighborReachabilityEventHandler handler) {
neighbor_event_handlers_.push_back(handler);
}
bool FakeClient::CreateTetheredNetwork(
const std::string& downstream_ifname,
const std::string& upstream_ifname,
const std::optional<DHCPOptions>& dhcp_options,
const std::optional<int>& mtu,
CreateTetheredNetworkCallback callback) {
// TODO(b/239559602) Run synchronously or schedule |callback| to run if
// necessary for unit tests.
return true;
}
bool FakeClient::CreateLocalOnlyNetwork(
const std::string& ifname, CreateLocalOnlyNetworkCallback callback) {
// TODO(b/239559602) Run synchronously or schedule |callback| to run if
// necessary for unit tests.
return true;
}
bool FakeClient::GetDownstreamNetworkInfo(
const std::string& ifname, DownstreamNetworkInfoCallback callback) {
// TODO(b/239559602) Run synchronously or schedule |callback| to run if
// necessary for unit tests.
return true;
}
void FakeClient::TriggerNeighborReachabilityEvent(
const NeighborReachabilityEvent& signal) {
for (const auto& handler : neighbor_event_handlers_)
handler.Run(signal);
}
} // namespace patchpanel