blob: 99cf9e90d9121a8d2d1a80cf1a3088a7eaee74df [file] [log] [blame]
markchienb6eb2c22018-07-18 14:29:20 +08001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server.connectivity.tethering;
18
markchien3b519632018-09-07 16:19:12 +080019import static android.net.ConnectivityManager.TETHERING_BLUETOOTH;
markchienf2731272019-01-16 17:44:13 +080020import static android.net.ConnectivityManager.TETHERING_USB;
21import static android.net.ConnectivityManager.TETHERING_WIFI;
22import static android.net.ConnectivityManager.TETHER_ERROR_ENTITLEMENT_UNKONWN;
23import static android.net.ConnectivityManager.TETHER_ERROR_NO_ERROR;
24import static android.net.ConnectivityManager.TETHER_ERROR_PROVISION_FAILED;
markchien0b595072019-01-08 23:52:21 +080025import static android.telephony.SubscriptionManager.INVALID_SUBSCRIPTION_ID;
markchienf2731272019-01-16 17:44:13 +080026
markchien0df2ebc42019-09-30 14:40:57 +080027import static com.android.dx.mockito.inline.extended.ExtendedMockito.doReturn;
28import static com.android.dx.mockito.inline.extended.ExtendedMockito.mockitoSession;
29
markchienf2731272019-01-16 17:44:13 +080030import static org.junit.Assert.assertEquals;
markchienb6eb2c22018-07-18 14:29:20 +080031import static org.junit.Assert.assertFalse;
32import static org.junit.Assert.assertTrue;
markchienf2731272019-01-16 17:44:13 +080033import static org.junit.Assert.fail;
markchienb6eb2c22018-07-18 14:29:20 +080034import static org.mockito.Matchers.anyBoolean;
markchien3394e142019-04-09 15:53:24 +080035import static org.mockito.Matchers.anyInt;
markchienb6eb2c22018-07-18 14:29:20 +080036import static org.mockito.Matchers.anyString;
37import static org.mockito.Matchers.eq;
markchien29b70142019-03-26 21:41:59 +080038import static org.mockito.Mockito.times;
39import static org.mockito.Mockito.verify;
markchienb6eb2c22018-07-18 14:29:20 +080040import static org.mockito.Mockito.when;
41
42import android.content.ContentResolver;
43import android.content.Context;
44import android.content.res.Resources;
45import android.net.util.SharedLog;
markchienf2731272019-01-16 17:44:13 +080046import android.os.Bundle;
47import android.os.Message;
markchienb6eb2c22018-07-18 14:29:20 +080048import android.os.PersistableBundle;
markchienf2731272019-01-16 17:44:13 +080049import android.os.ResultReceiver;
markchien0df2ebc42019-09-30 14:40:57 +080050import android.os.SystemProperties;
markchienf2731272019-01-16 17:44:13 +080051import android.os.test.TestLooper;
52import android.provider.Settings;
markchienb6eb2c22018-07-18 14:29:20 +080053import android.telephony.CarrierConfigManager;
markchienf2731272019-01-16 17:44:13 +080054import android.test.mock.MockContentResolver;
markchienb6eb2c22018-07-18 14:29:20 +080055
Brett Chabot1ae2aa62019-03-04 14:14:56 -080056import androidx.test.filters.SmallTest;
57import androidx.test.runner.AndroidJUnit4;
58
markchienb6eb2c22018-07-18 14:29:20 +080059import com.android.internal.R;
markchienf2731272019-01-16 17:44:13 +080060import com.android.internal.util.State;
61import com.android.internal.util.StateMachine;
62import com.android.internal.util.test.BroadcastInterceptingContext;
63import com.android.internal.util.test.FakeSettingsProvider;
markchienb6eb2c22018-07-18 14:29:20 +080064
65import org.junit.After;
66import org.junit.Before;
67import org.junit.Test;
68import org.junit.runner.RunWith;
69import org.mockito.Mock;
70import org.mockito.MockitoAnnotations;
markchien0df2ebc42019-09-30 14:40:57 +080071import org.mockito.MockitoSession;
72import org.mockito.quality.Strictness;
markchienb6eb2c22018-07-18 14:29:20 +080073
markchienf2731272019-01-16 17:44:13 +080074import java.util.ArrayList;
75import java.util.concurrent.CountDownLatch;
76import java.util.concurrent.TimeUnit;
77
markchienb6eb2c22018-07-18 14:29:20 +080078@RunWith(AndroidJUnit4.class)
79@SmallTest
80public final class EntitlementManagerTest {
81
82 private static final int EVENT_EM_UPDATE = 1;
83 private static final String[] PROVISIONING_APP_NAME = {"some", "app"};
markchien3b519632018-09-07 16:19:12 +080084 private static final String PROVISIONING_NO_UI_APP_NAME = "no_ui_app";
markchienb6eb2c22018-07-18 14:29:20 +080085
86 @Mock private CarrierConfigManager mCarrierConfigManager;
87 @Mock private Context mContext;
markchienb6eb2c22018-07-18 14:29:20 +080088 @Mock private Resources mResources;
89 @Mock private SharedLog mLog;
markchien29b70142019-03-26 21:41:59 +080090 @Mock private EntitlementManager.OnUiEntitlementFailedListener mEntitlementFailedListener;
markchienb6eb2c22018-07-18 14:29:20 +080091
92 // Like so many Android system APIs, these cannot be mocked because it is marked final.
93 // We have to use the real versions.
94 private final PersistableBundle mCarrierConfig = new PersistableBundle();
markchienf2731272019-01-16 17:44:13 +080095 private final TestLooper mLooper = new TestLooper();
96 private Context mMockContext;
97 private MockContentResolver mContentResolver;
markchienb6eb2c22018-07-18 14:29:20 +080098
markchienf2731272019-01-16 17:44:13 +080099 private TestStateMachine mSM;
100 private WrappedEntitlementManager mEnMgr;
markchien3394e142019-04-09 15:53:24 +0800101 private TetheringConfiguration mConfig;
markchien0df2ebc42019-09-30 14:40:57 +0800102 private MockitoSession mMockingSession;
markchienf2731272019-01-16 17:44:13 +0800103
104 private class MockContext extends BroadcastInterceptingContext {
105 MockContext(Context base) {
106 super(base);
107 }
108
109 @Override
110 public Resources getResources() {
111 return mResources;
112 }
113
114 @Override
115 public ContentResolver getContentResolver() {
116 return mContentResolver;
117 }
118 }
119
120 public class WrappedEntitlementManager extends EntitlementManager {
121 public int fakeEntitlementResult = TETHER_ERROR_ENTITLEMENT_UNKONWN;
markchien3b519632018-09-07 16:19:12 +0800122 public int uiProvisionCount = 0;
123 public int silentProvisionCount = 0;
markchienf2731272019-01-16 17:44:13 +0800124
125 public WrappedEntitlementManager(Context ctx, StateMachine target,
markchien0df2ebc42019-09-30 14:40:57 +0800126 SharedLog log, int what) {
127 super(ctx, target, log, what);
markchienf2731272019-01-16 17:44:13 +0800128 }
129
markchien29b70142019-03-26 21:41:59 +0800130 public void reset() {
131 fakeEntitlementResult = TETHER_ERROR_ENTITLEMENT_UNKONWN;
132 uiProvisionCount = 0;
133 silentProvisionCount = 0;
markchienf2731272019-01-16 17:44:13 +0800134 }
markchien3b519632018-09-07 16:19:12 +0800135
136 @Override
markchien3394e142019-04-09 15:53:24 +0800137 protected void runUiTetherProvisioning(int type, int subId, ResultReceiver receiver) {
markchien3b519632018-09-07 16:19:12 +0800138 uiProvisionCount++;
markchien29b70142019-03-26 21:41:59 +0800139 receiver.send(fakeEntitlementResult, null);
markchien3b519632018-09-07 16:19:12 +0800140 }
141
142 @Override
markchien3394e142019-04-09 15:53:24 +0800143 protected void runSilentTetherProvisioning(int type, int subId) {
markchien3b519632018-09-07 16:19:12 +0800144 silentProvisionCount++;
markchien29b70142019-03-26 21:41:59 +0800145 addDownstreamMapping(type, fakeEntitlementResult);
markchien3b519632018-09-07 16:19:12 +0800146 }
markchienf2731272019-01-16 17:44:13 +0800147 }
markchienb6eb2c22018-07-18 14:29:20 +0800148
149 @Before
150 public void setUp() {
151 MockitoAnnotations.initMocks(this);
markchien0df2ebc42019-09-30 14:40:57 +0800152 mMockingSession = mockitoSession()
153 .initMocks(this)
154 .spyStatic(SystemProperties.class)
155 .strictness(Strictness.WARN)
156 .startMocking();
157 // Don't disable tethering provisioning unless requested.
158 doReturn(false).when(
159 () -> SystemProperties.getBoolean(
160 eq(EntitlementManager.DISABLE_PROVISIONING_SYSPROP_KEY), anyBoolean()));
markchienb6eb2c22018-07-18 14:29:20 +0800161
markchienb6eb2c22018-07-18 14:29:20 +0800162 when(mResources.getStringArray(R.array.config_tether_dhcp_range))
163 .thenReturn(new String[0]);
164 when(mResources.getStringArray(R.array.config_tether_usb_regexs))
165 .thenReturn(new String[0]);
166 when(mResources.getStringArray(R.array.config_tether_wifi_regexs))
167 .thenReturn(new String[0]);
168 when(mResources.getStringArray(R.array.config_tether_bluetooth_regexs))
169 .thenReturn(new String[0]);
170 when(mResources.getIntArray(R.array.config_tether_upstream_types))
171 .thenReturn(new int[0]);
172 when(mLog.forSubComponent(anyString())).thenReturn(mLog);
173
markchienf2731272019-01-16 17:44:13 +0800174 mContentResolver = new MockContentResolver();
175 mContentResolver.addProvider(Settings.AUTHORITY, new FakeSettingsProvider());
176 mMockContext = new MockContext(mContext);
177 mSM = new TestStateMachine();
markchien0df2ebc42019-09-30 14:40:57 +0800178 mEnMgr = new WrappedEntitlementManager(mMockContext, mSM, mLog, EVENT_EM_UPDATE);
markchien29b70142019-03-26 21:41:59 +0800179 mEnMgr.setOnUiEntitlementFailedListener(mEntitlementFailedListener);
markchien3394e142019-04-09 15:53:24 +0800180 mConfig = new TetheringConfiguration(mMockContext, mLog, INVALID_SUBSCRIPTION_ID);
181 mEnMgr.setTetheringConfigurationFetcher(() -> {
182 return mConfig;
183 });
markchienb6eb2c22018-07-18 14:29:20 +0800184 }
185
186 @After
markchienf2731272019-01-16 17:44:13 +0800187 public void tearDown() throws Exception {
188 if (mSM != null) {
189 mSM.quit();
190 mSM = null;
191 }
markchien0df2ebc42019-09-30 14:40:57 +0800192 mMockingSession.finishMocking();
markchienf2731272019-01-16 17:44:13 +0800193 }
markchienb6eb2c22018-07-18 14:29:20 +0800194
195 private void setupForRequiredProvisioning() {
196 // Produce some acceptable looking provision app setting if requested.
197 when(mResources.getStringArray(R.array.config_mobile_hotspot_provision_app))
198 .thenReturn(PROVISIONING_APP_NAME);
markchien3b519632018-09-07 16:19:12 +0800199 when(mResources.getString(R.string.config_mobile_hotspot_provision_app_no_ui))
200 .thenReturn(PROVISIONING_NO_UI_APP_NAME);
markchienb6eb2c22018-07-18 14:29:20 +0800201 // Act like the CarrierConfigManager is present and ready unless told otherwise.
202 when(mContext.getSystemService(Context.CARRIER_CONFIG_SERVICE))
203 .thenReturn(mCarrierConfigManager);
markchien3394e142019-04-09 15:53:24 +0800204 when(mCarrierConfigManager.getConfigForSubId(anyInt())).thenReturn(mCarrierConfig);
markchienb6eb2c22018-07-18 14:29:20 +0800205 mCarrierConfig.putBoolean(CarrierConfigManager.KEY_REQUIRE_ENTITLEMENT_CHECKS_BOOL, true);
markchien29a650c2019-03-19 20:57:04 +0800206 mCarrierConfig.putBoolean(CarrierConfigManager.KEY_CARRIER_CONFIG_APPLIED_BOOL, true);
markchien3394e142019-04-09 15:53:24 +0800207 mConfig = new TetheringConfiguration(mMockContext, mLog, INVALID_SUBSCRIPTION_ID);
markchienb6eb2c22018-07-18 14:29:20 +0800208 }
209
210 @Test
211 public void canRequireProvisioning() {
212 setupForRequiredProvisioning();
markchien3394e142019-04-09 15:53:24 +0800213 assertTrue(mEnMgr.isTetherProvisioningRequired(mConfig));
markchienb6eb2c22018-07-18 14:29:20 +0800214 }
215
216 @Test
217 public void toleratesCarrierConfigManagerMissing() {
218 setupForRequiredProvisioning();
219 when(mContext.getSystemService(Context.CARRIER_CONFIG_SERVICE))
220 .thenReturn(null);
markchien3394e142019-04-09 15:53:24 +0800221 mConfig = new TetheringConfiguration(mMockContext, mLog, INVALID_SUBSCRIPTION_ID);
markchienb6eb2c22018-07-18 14:29:20 +0800222 // Couldn't get the CarrierConfigManager, but still had a declared provisioning app.
223 // Therefore provisioning still be required.
markchien3394e142019-04-09 15:53:24 +0800224 assertTrue(mEnMgr.isTetherProvisioningRequired(mConfig));
markchienb6eb2c22018-07-18 14:29:20 +0800225 }
226
227 @Test
228 public void toleratesCarrierConfigMissing() {
229 setupForRequiredProvisioning();
230 when(mCarrierConfigManager.getConfig()).thenReturn(null);
markchien3394e142019-04-09 15:53:24 +0800231 mConfig = new TetheringConfiguration(mMockContext, mLog, INVALID_SUBSCRIPTION_ID);
markchienb6eb2c22018-07-18 14:29:20 +0800232 // We still have a provisioning app configured, so still require provisioning.
markchien3394e142019-04-09 15:53:24 +0800233 assertTrue(mEnMgr.isTetherProvisioningRequired(mConfig));
markchienb6eb2c22018-07-18 14:29:20 +0800234 }
235
236 @Test
markchien29a650c2019-03-19 20:57:04 +0800237 public void toleratesCarrierConfigNotLoaded() {
238 setupForRequiredProvisioning();
239 mCarrierConfig.putBoolean(CarrierConfigManager.KEY_CARRIER_CONFIG_APPLIED_BOOL, false);
markchien29a650c2019-03-19 20:57:04 +0800240 // We still have a provisioning app configured, so still require provisioning.
markchien3394e142019-04-09 15:53:24 +0800241 assertTrue(mEnMgr.isTetherProvisioningRequired(mConfig));
markchien29a650c2019-03-19 20:57:04 +0800242 }
243
244 @Test
markchienb6eb2c22018-07-18 14:29:20 +0800245 public void provisioningNotRequiredWhenAppNotFound() {
246 setupForRequiredProvisioning();
247 when(mResources.getStringArray(R.array.config_mobile_hotspot_provision_app))
248 .thenReturn(null);
markchien3394e142019-04-09 15:53:24 +0800249 mConfig = new TetheringConfiguration(mMockContext, mLog, INVALID_SUBSCRIPTION_ID);
250 assertFalse(mEnMgr.isTetherProvisioningRequired(mConfig));
markchienb6eb2c22018-07-18 14:29:20 +0800251 when(mResources.getStringArray(R.array.config_mobile_hotspot_provision_app))
252 .thenReturn(new String[] {"malformedApp"});
markchien3394e142019-04-09 15:53:24 +0800253 mConfig = new TetheringConfiguration(mMockContext, mLog, INVALID_SUBSCRIPTION_ID);
254 assertFalse(mEnMgr.isTetherProvisioningRequired(mConfig));
markchienb6eb2c22018-07-18 14:29:20 +0800255 }
256
markchienf2731272019-01-16 17:44:13 +0800257 @Test
markchien0df2ebc42019-09-30 14:40:57 +0800258 public void testRequestLastEntitlementCacheValue() throws Exception {
markchienf2731272019-01-16 17:44:13 +0800259 final CountDownLatch mCallbacklatch = new CountDownLatch(1);
260 // 1. Entitlement check is not required.
261 mEnMgr.fakeEntitlementResult = TETHER_ERROR_NO_ERROR;
markchienf2731272019-01-16 17:44:13 +0800262 ResultReceiver receiver = new ResultReceiver(null) {
263 @Override
264 protected void onReceiveResult(int resultCode, Bundle resultData) {
265 assertEquals(TETHER_ERROR_NO_ERROR, resultCode);
266 mCallbacklatch.countDown();
267 }
268 };
markchien0df2ebc42019-09-30 14:40:57 +0800269 mEnMgr.requestLatestTetheringEntitlementResult(TETHERING_WIFI, receiver, true);
markchien3b519632018-09-07 16:19:12 +0800270 mLooper.dispatchAll();
markchienf2731272019-01-16 17:44:13 +0800271 callbackTimeoutHelper(mCallbacklatch);
markchien29b70142019-03-26 21:41:59 +0800272 assertEquals(0, mEnMgr.uiProvisionCount);
273 mEnMgr.reset();
markchienf2731272019-01-16 17:44:13 +0800274
275 setupForRequiredProvisioning();
markchienf2731272019-01-16 17:44:13 +0800276 // 2. No cache value and don't need to run entitlement check.
markchienf2731272019-01-16 17:44:13 +0800277 receiver = new ResultReceiver(null) {
278 @Override
279 protected void onReceiveResult(int resultCode, Bundle resultData) {
280 assertEquals(TETHER_ERROR_ENTITLEMENT_UNKONWN, resultCode);
281 mCallbacklatch.countDown();
282 }
283 };
markchien0df2ebc42019-09-30 14:40:57 +0800284 mEnMgr.requestLatestTetheringEntitlementResult(TETHERING_WIFI, receiver, false);
markchien3b519632018-09-07 16:19:12 +0800285 mLooper.dispatchAll();
markchienf2731272019-01-16 17:44:13 +0800286 callbackTimeoutHelper(mCallbacklatch);
markchien29b70142019-03-26 21:41:59 +0800287 assertEquals(0, mEnMgr.uiProvisionCount);
288 mEnMgr.reset();
markchienf2731272019-01-16 17:44:13 +0800289 // 3. No cache value and ui entitlement check is needed.
290 mEnMgr.fakeEntitlementResult = TETHER_ERROR_PROVISION_FAILED;
markchienf2731272019-01-16 17:44:13 +0800291 receiver = new ResultReceiver(null) {
292 @Override
293 protected void onReceiveResult(int resultCode, Bundle resultData) {
294 assertEquals(TETHER_ERROR_PROVISION_FAILED, resultCode);
295 mCallbacklatch.countDown();
296 }
297 };
markchien0df2ebc42019-09-30 14:40:57 +0800298 mEnMgr.requestLatestTetheringEntitlementResult(TETHERING_WIFI, receiver, true);
markchienf2731272019-01-16 17:44:13 +0800299 mLooper.dispatchAll();
300 callbackTimeoutHelper(mCallbacklatch);
markchien29b70142019-03-26 21:41:59 +0800301 assertEquals(1, mEnMgr.uiProvisionCount);
302 mEnMgr.reset();
markchienf2731272019-01-16 17:44:13 +0800303 // 4. Cache value is TETHER_ERROR_PROVISION_FAILED and don't need to run entitlement check.
304 mEnMgr.fakeEntitlementResult = TETHER_ERROR_NO_ERROR;
markchienf2731272019-01-16 17:44:13 +0800305 receiver = new ResultReceiver(null) {
306 @Override
307 protected void onReceiveResult(int resultCode, Bundle resultData) {
308 assertEquals(TETHER_ERROR_PROVISION_FAILED, resultCode);
309 mCallbacklatch.countDown();
310 }
311 };
markchien0df2ebc42019-09-30 14:40:57 +0800312 mEnMgr.requestLatestTetheringEntitlementResult(TETHERING_WIFI, receiver, false);
markchien3b519632018-09-07 16:19:12 +0800313 mLooper.dispatchAll();
markchienf2731272019-01-16 17:44:13 +0800314 callbackTimeoutHelper(mCallbacklatch);
markchien29b70142019-03-26 21:41:59 +0800315 assertEquals(0, mEnMgr.uiProvisionCount);
316 mEnMgr.reset();
markchienf2731272019-01-16 17:44:13 +0800317 // 5. Cache value is TETHER_ERROR_PROVISION_FAILED and ui entitlement check is needed.
318 mEnMgr.fakeEntitlementResult = TETHER_ERROR_NO_ERROR;
markchienf2731272019-01-16 17:44:13 +0800319 receiver = new ResultReceiver(null) {
320 @Override
321 protected void onReceiveResult(int resultCode, Bundle resultData) {
322 assertEquals(TETHER_ERROR_NO_ERROR, resultCode);
323 mCallbacklatch.countDown();
324 }
325 };
markchien0df2ebc42019-09-30 14:40:57 +0800326 mEnMgr.requestLatestTetheringEntitlementResult(TETHERING_WIFI, receiver, true);
markchienf2731272019-01-16 17:44:13 +0800327 mLooper.dispatchAll();
328 callbackTimeoutHelper(mCallbacklatch);
markchien29b70142019-03-26 21:41:59 +0800329 assertEquals(1, mEnMgr.uiProvisionCount);
330 mEnMgr.reset();
markchienf2731272019-01-16 17:44:13 +0800331 // 6. Cache value is TETHER_ERROR_NO_ERROR.
332 mEnMgr.fakeEntitlementResult = TETHER_ERROR_NO_ERROR;
markchienf2731272019-01-16 17:44:13 +0800333 receiver = new ResultReceiver(null) {
334 @Override
335 protected void onReceiveResult(int resultCode, Bundle resultData) {
336 assertEquals(TETHER_ERROR_NO_ERROR, resultCode);
337 mCallbacklatch.countDown();
338 }
339 };
markchien0df2ebc42019-09-30 14:40:57 +0800340 mEnMgr.requestLatestTetheringEntitlementResult(TETHERING_WIFI, receiver, true);
markchien3b519632018-09-07 16:19:12 +0800341 mLooper.dispatchAll();
markchienf2731272019-01-16 17:44:13 +0800342 callbackTimeoutHelper(mCallbacklatch);
markchien29b70142019-03-26 21:41:59 +0800343 assertEquals(0, mEnMgr.uiProvisionCount);
344 mEnMgr.reset();
markchienf2731272019-01-16 17:44:13 +0800345 // 7. Test get value for other downstream type.
markchienf2731272019-01-16 17:44:13 +0800346 receiver = new ResultReceiver(null) {
347 @Override
348 protected void onReceiveResult(int resultCode, Bundle resultData) {
349 assertEquals(TETHER_ERROR_ENTITLEMENT_UNKONWN, resultCode);
350 mCallbacklatch.countDown();
351 }
352 };
markchien0df2ebc42019-09-30 14:40:57 +0800353 mEnMgr.requestLatestTetheringEntitlementResult(TETHERING_USB, receiver, false);
markchien3b519632018-09-07 16:19:12 +0800354 mLooper.dispatchAll();
markchienf2731272019-01-16 17:44:13 +0800355 callbackTimeoutHelper(mCallbacklatch);
markchien29b70142019-03-26 21:41:59 +0800356 assertEquals(0, mEnMgr.uiProvisionCount);
357 mEnMgr.reset();
markchienf2731272019-01-16 17:44:13 +0800358 }
359
360 void callbackTimeoutHelper(final CountDownLatch latch) throws Exception {
361 if (!latch.await(1, TimeUnit.SECONDS)) {
markchien3b519632018-09-07 16:19:12 +0800362 fail("Timout, fail to receive callback");
markchienf2731272019-01-16 17:44:13 +0800363 }
364 }
markchien3b519632018-09-07 16:19:12 +0800365
366 @Test
367 public void verifyPermissionResult() {
368 setupForRequiredProvisioning();
369 mEnMgr.notifyUpstream(true);
markchien29b70142019-03-26 21:41:59 +0800370 mEnMgr.fakeEntitlementResult = TETHER_ERROR_PROVISION_FAILED;
markchien3b519632018-09-07 16:19:12 +0800371 mEnMgr.startProvisioningIfNeeded(TETHERING_WIFI, true);
372 mLooper.dispatchAll();
markchien3b519632018-09-07 16:19:12 +0800373 assertFalse(mEnMgr.isCellularUpstreamPermitted());
374 mEnMgr.stopProvisioningIfNeeded(TETHERING_WIFI);
375 mLooper.dispatchAll();
markchien29b70142019-03-26 21:41:59 +0800376 mEnMgr.fakeEntitlementResult = TETHER_ERROR_NO_ERROR;
markchien3b519632018-09-07 16:19:12 +0800377 mEnMgr.startProvisioningIfNeeded(TETHERING_WIFI, true);
378 mLooper.dispatchAll();
markchien3b519632018-09-07 16:19:12 +0800379 assertTrue(mEnMgr.isCellularUpstreamPermitted());
380 }
381
382 @Test
383 public void verifyPermissionIfAllNotApproved() {
384 setupForRequiredProvisioning();
385 mEnMgr.notifyUpstream(true);
markchien29b70142019-03-26 21:41:59 +0800386 mEnMgr.fakeEntitlementResult = TETHER_ERROR_PROVISION_FAILED;
markchien3b519632018-09-07 16:19:12 +0800387 mEnMgr.startProvisioningIfNeeded(TETHERING_WIFI, true);
388 mLooper.dispatchAll();
markchien3b519632018-09-07 16:19:12 +0800389 assertFalse(mEnMgr.isCellularUpstreamPermitted());
markchien29b70142019-03-26 21:41:59 +0800390 mEnMgr.fakeEntitlementResult = TETHER_ERROR_PROVISION_FAILED;
markchien3b519632018-09-07 16:19:12 +0800391 mEnMgr.startProvisioningIfNeeded(TETHERING_USB, true);
392 mLooper.dispatchAll();
markchien3b519632018-09-07 16:19:12 +0800393 assertFalse(mEnMgr.isCellularUpstreamPermitted());
markchien29b70142019-03-26 21:41:59 +0800394 mEnMgr.fakeEntitlementResult = TETHER_ERROR_PROVISION_FAILED;
markchien3b519632018-09-07 16:19:12 +0800395 mEnMgr.startProvisioningIfNeeded(TETHERING_BLUETOOTH, true);
396 mLooper.dispatchAll();
markchien3b519632018-09-07 16:19:12 +0800397 assertFalse(mEnMgr.isCellularUpstreamPermitted());
398 }
399
400 @Test
401 public void verifyPermissionIfAnyApproved() {
402 setupForRequiredProvisioning();
403 mEnMgr.notifyUpstream(true);
markchien29b70142019-03-26 21:41:59 +0800404 mEnMgr.fakeEntitlementResult = TETHER_ERROR_NO_ERROR;
markchien3b519632018-09-07 16:19:12 +0800405 mEnMgr.startProvisioningIfNeeded(TETHERING_WIFI, true);
406 mLooper.dispatchAll();
markchien3b519632018-09-07 16:19:12 +0800407 assertTrue(mEnMgr.isCellularUpstreamPermitted());
408 mLooper.dispatchAll();
markchien29b70142019-03-26 21:41:59 +0800409 mEnMgr.fakeEntitlementResult = TETHER_ERROR_PROVISION_FAILED;
markchien3b519632018-09-07 16:19:12 +0800410 mEnMgr.startProvisioningIfNeeded(TETHERING_USB, true);
411 mLooper.dispatchAll();
markchien3b519632018-09-07 16:19:12 +0800412 assertTrue(mEnMgr.isCellularUpstreamPermitted());
413 mEnMgr.stopProvisioningIfNeeded(TETHERING_WIFI);
414 mLooper.dispatchAll();
415 assertFalse(mEnMgr.isCellularUpstreamPermitted());
416
417 }
418
419 @Test
markchien426311b2019-08-09 21:43:38 +0800420 public void verifyPermissionWhenProvisioningNotStarted() {
421 assertTrue(mEnMgr.isCellularUpstreamPermitted());
422 setupForRequiredProvisioning();
423 assertFalse(mEnMgr.isCellularUpstreamPermitted());
424 }
425
426 @Test
markchien3b519632018-09-07 16:19:12 +0800427 public void testRunTetherProvisioning() {
428 setupForRequiredProvisioning();
markchien3b519632018-09-07 16:19:12 +0800429 // 1. start ui provisioning, upstream is mobile
markchien29b70142019-03-26 21:41:59 +0800430 mEnMgr.fakeEntitlementResult = TETHER_ERROR_NO_ERROR;
markchien3b519632018-09-07 16:19:12 +0800431 mEnMgr.notifyUpstream(true);
432 mLooper.dispatchAll();
433 mEnMgr.startProvisioningIfNeeded(TETHERING_USB, true);
434 mLooper.dispatchAll();
markchien29b70142019-03-26 21:41:59 +0800435 assertEquals(1, mEnMgr.uiProvisionCount);
436 assertEquals(0, mEnMgr.silentProvisionCount);
437 assertTrue(mEnMgr.isCellularUpstreamPermitted());
438 mEnMgr.reset();
markchien3b519632018-09-07 16:19:12 +0800439 // 2. start no-ui provisioning
markchien29b70142019-03-26 21:41:59 +0800440 mEnMgr.fakeEntitlementResult = TETHER_ERROR_NO_ERROR;
markchien3b519632018-09-07 16:19:12 +0800441 mEnMgr.startProvisioningIfNeeded(TETHERING_WIFI, false);
442 mLooper.dispatchAll();
markchien29b70142019-03-26 21:41:59 +0800443 assertEquals(0, mEnMgr.uiProvisionCount);
444 assertEquals(1, mEnMgr.silentProvisionCount);
445 assertTrue(mEnMgr.isCellularUpstreamPermitted());
446 mEnMgr.reset();
markchien3b519632018-09-07 16:19:12 +0800447 // 3. tear down mobile, then start ui provisioning
448 mEnMgr.notifyUpstream(false);
449 mLooper.dispatchAll();
450 mEnMgr.startProvisioningIfNeeded(TETHERING_BLUETOOTH, true);
451 mLooper.dispatchAll();
markchien29b70142019-03-26 21:41:59 +0800452 assertEquals(0, mEnMgr.uiProvisionCount);
453 assertEquals(0, mEnMgr.silentProvisionCount);
454 mEnMgr.reset();
markchien3b519632018-09-07 16:19:12 +0800455 // 4. switch upstream back to mobile
markchien29b70142019-03-26 21:41:59 +0800456 mEnMgr.fakeEntitlementResult = TETHER_ERROR_NO_ERROR;
markchien3b519632018-09-07 16:19:12 +0800457 mEnMgr.notifyUpstream(true);
458 mLooper.dispatchAll();
markchien29b70142019-03-26 21:41:59 +0800459 assertEquals(1, mEnMgr.uiProvisionCount);
460 assertEquals(0, mEnMgr.silentProvisionCount);
461 assertTrue(mEnMgr.isCellularUpstreamPermitted());
462 mEnMgr.reset();
markchien3b519632018-09-07 16:19:12 +0800463 // 5. tear down mobile, then switch SIM
464 mEnMgr.notifyUpstream(false);
465 mLooper.dispatchAll();
markchien3394e142019-04-09 15:53:24 +0800466 mEnMgr.reevaluateSimCardProvisioning(mConfig);
markchien29b70142019-03-26 21:41:59 +0800467 assertEquals(0, mEnMgr.uiProvisionCount);
468 assertEquals(0, mEnMgr.silentProvisionCount);
469 mEnMgr.reset();
markchien3b519632018-09-07 16:19:12 +0800470 // 6. switch upstream back to mobile again
markchien29b70142019-03-26 21:41:59 +0800471 mEnMgr.fakeEntitlementResult = TETHER_ERROR_PROVISION_FAILED;
markchien3b519632018-09-07 16:19:12 +0800472 mEnMgr.notifyUpstream(true);
473 mLooper.dispatchAll();
markchien29b70142019-03-26 21:41:59 +0800474 assertEquals(0, mEnMgr.uiProvisionCount);
475 assertEquals(3, mEnMgr.silentProvisionCount);
476 mEnMgr.reset();
markchien3b519632018-09-07 16:19:12 +0800477 }
478
markchien29b70142019-03-26 21:41:59 +0800479 @Test
480 public void testCallStopTetheringWhenUiProvisioningFail() {
481 setupForRequiredProvisioning();
markchien29b70142019-03-26 21:41:59 +0800482 verify(mEntitlementFailedListener, times(0)).onUiEntitlementFailed(TETHERING_WIFI);
483 mEnMgr.fakeEntitlementResult = TETHER_ERROR_PROVISION_FAILED;
484 mEnMgr.notifyUpstream(true);
485 mLooper.dispatchAll();
486 mEnMgr.startProvisioningIfNeeded(TETHERING_WIFI, true);
487 mLooper.dispatchAll();
488 assertEquals(1, mEnMgr.uiProvisionCount);
489 verify(mEntitlementFailedListener, times(1)).onUiEntitlementFailed(TETHERING_WIFI);
490 }
491
markchienf2731272019-01-16 17:44:13 +0800492 public class TestStateMachine extends StateMachine {
493 public final ArrayList<Message> messages = new ArrayList<>();
markchien3b519632018-09-07 16:19:12 +0800494 private final State
495 mLoggingState = new EntitlementManagerTest.TestStateMachine.LoggingState();
markchienf2731272019-01-16 17:44:13 +0800496
497 class LoggingState extends State {
498 @Override public void enter() {
499 messages.clear();
500 }
501
502 @Override public void exit() {
503 messages.clear();
504 }
505
506 @Override public boolean processMessage(Message msg) {
507 messages.add(msg);
508 return false;
509 }
510 }
511
512 public TestStateMachine() {
513 super("EntitlementManagerTest.TestStateMachine", mLooper.getLooper());
514 addState(mLoggingState);
515 setInitialState(mLoggingState);
516 super.start();
517 }
518 }
markchienb6eb2c22018-07-18 14:29:20 +0800519}