| // Copyright (c) 2012 The Chromium OS Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "shill/manager.h" |
| |
| #include <map> |
| #include <set> |
| |
| #include <glib.h> |
| |
| #include <base/file_util.h> |
| #include <base/files/scoped_temp_dir.h> |
| #include <base/stl_util.h> |
| #include <base/stringprintf.h> |
| #include <chromeos/dbus/service_constants.h> |
| #include <gmock/gmock.h> |
| #include <gtest/gtest.h> |
| |
| #include "shill/adaptor_interfaces.h" |
| #include "shill/ephemeral_profile.h" |
| #include "shill/error.h" |
| #include "shill/glib.h" |
| #include "shill/key_file_store.h" |
| #include "shill/key_value_store.h" |
| #include "shill/link_monitor.h" |
| #include "shill/logging.h" |
| #include "shill/mock_adaptors.h" |
| #include "shill/mock_connection.h" |
| #include "shill/mock_control.h" |
| #include "shill/mock_crypto_util_proxy.h" |
| #include "shill/mock_device.h" |
| #include "shill/mock_device_info.h" |
| #include "shill/mock_ethernet_eap_provider.h" |
| #include "shill/mock_glib.h" |
| #include "shill/mock_metrics.h" |
| #include "shill/mock_power_manager.h" |
| #include "shill/mock_profile.h" |
| #include "shill/mock_resolver.h" |
| #include "shill/mock_service.h" |
| #include "shill/mock_store.h" |
| #include "shill/mock_wifi_provider.h" |
| #include "shill/mock_wifi_service.h" |
| #include "shill/portal_detector.h" |
| #include "shill/property_store_unittest.h" |
| #include "shill/proxy_factory.h" |
| #include "shill/resolver.h" |
| #include "shill/service_under_test.h" |
| #include "shill/wifi_service.h" |
| #include "shill/wimax_service.h" |
| |
| using base::Bind; |
| using base::FilePath; |
| using base::ScopedTempDir; |
| using std::map; |
| using std::set; |
| using std::string; |
| using std::vector; |
| |
| namespace shill { |
| using ::testing::_; |
| using ::testing::AnyNumber; |
| using ::testing::ContainerEq; |
| using ::testing::DoAll; |
| using ::testing::InSequence; |
| using ::testing::Invoke; |
| using ::testing::Mock; |
| using ::testing::Ne; |
| using ::testing::NiceMock; |
| using ::testing::Ref; |
| using ::testing::Return; |
| using ::testing::ReturnRef; |
| using ::testing::SaveArg; |
| using ::testing::SetArgumentPointee; |
| using ::testing::StrEq; |
| using ::testing::StrictMock; |
| using ::testing::Test; |
| using ::testing::WithArg; |
| |
| class ManagerTest : public PropertyStoreTest { |
| public: |
| ManagerTest() |
| : power_manager_(new MockPowerManager(NULL, &proxy_factory_)), |
| device_info_(new NiceMock<MockDeviceInfo>( |
| control_interface(), |
| reinterpret_cast<EventDispatcher*>(NULL), |
| reinterpret_cast<Metrics*>(NULL), |
| reinterpret_cast<Manager*>(NULL))), |
| manager_adaptor_(new NiceMock<ManagerMockAdaptor>()), |
| ethernet_eap_provider_(new NiceMock<MockEthernetEapProvider>()), |
| wifi_provider_(new NiceMock<MockWiFiProvider>()), |
| crypto_util_proxy_(new NiceMock<MockCryptoUtilProxy>(dispatcher(), |
| glib())) { |
| mock_devices_.push_back(new NiceMock<MockDevice>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| "null0", |
| "addr0", |
| 0)); |
| mock_devices_.push_back(new NiceMock<MockDevice>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| "null1", |
| "addr1", |
| 1)); |
| mock_devices_.push_back(new NiceMock<MockDevice>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| "null2", |
| "addr2", |
| 2)); |
| mock_devices_.push_back(new NiceMock<MockDevice>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| "null3", |
| "addr3", |
| 3)); |
| manager()->connect_profiles_to_rpc_ = false; |
| SetRunning(true); |
| |
| // Replace the manager's adaptor with a quieter one, and one |
| // we can do EXPECT*() against. Passes ownership. |
| manager()->adaptor_.reset(manager_adaptor_); |
| |
| // Replace the manager's Ethernet EAP provider with our mock. |
| // Passes ownership. |
| manager()->ethernet_eap_provider_.reset(ethernet_eap_provider_); |
| |
| // Replace the manager's WiFi provider with our mock. Passes |
| // ownership. |
| manager()->wifi_provider_.reset(wifi_provider_); |
| |
| // Update the manager's map from technology to provider. |
| manager()->UpdateProviderMapping(); |
| |
| // Replace the manager's crypto util proxy with our mock. Passes |
| // ownership. |
| manager()->crypto_util_proxy_.reset(crypto_util_proxy_); |
| |
| // Reset service serial number so service sorting by unique_name() |
| // (and by extension, sorting by order of creation) is predictable. |
| Service::serial_number_ = 10000; |
| } |
| virtual ~ManagerTest() {} |
| |
| void SetMetrics(Metrics *metrics) { |
| manager()->set_metrics(metrics); |
| } |
| |
| bool IsDeviceRegistered(const DeviceRefPtr &device, |
| Technology::Identifier tech) { |
| vector<DeviceRefPtr> devices; |
| manager()->FilterByTechnology(tech, &devices); |
| return (devices.size() == 1 && devices[0].get() == device.get()); |
| } |
| bool ServiceOrderIs(ServiceRefPtr svc1, ServiceRefPtr svc2); |
| |
| void AdoptProfile(Manager *manager, ProfileRefPtr profile) { |
| manager->profiles_.push_back(profile); |
| } |
| |
| void SetRunning(bool running) { |
| manager()->running_ = running; |
| } |
| |
| ProfileRefPtr GetEphemeralProfile(Manager *manager) { |
| return manager->ephemeral_profile_; |
| } |
| |
| vector<ProfileRefPtr> &GetProfiles(Manager *manager) { |
| return manager->profiles_; |
| } |
| |
| Profile *CreateProfileForManager(Manager *manager, GLib *glib) { |
| Profile::Identifier id("rather", "irrelevant"); |
| FilePath final_path(storage_path()); |
| final_path = final_path.Append("test.profile"); |
| scoped_ptr<KeyFileStore> storage(new KeyFileStore(glib)); |
| storage->set_path(final_path); |
| if (!storage->Open()) |
| return NULL; |
| Profile *profile(new Profile(control_interface(), |
| metrics(), |
| manager, |
| id, |
| "", |
| false)); |
| profile->set_storage(storage.release()); // Passes ownership of "storage". |
| return profile; // Passes onwership of "profile". |
| } |
| |
| bool CreateBackingStoreForService(ScopedTempDir *temp_dir, |
| const string &profile_identifier, |
| const string &service_name) { |
| GLib glib; |
| KeyFileStore store(&glib); |
| store.set_path(temp_dir->path().Append(profile_identifier + ".profile")); |
| return store.Open() && |
| store.SetString(service_name, "rather", "irrelevant") && |
| store.Close(); |
| } |
| |
| Error::Type TestCreateProfile(Manager *manager, const string &name) { |
| Error error; |
| string path; |
| manager->CreateProfile(name, &path, &error); |
| return error.type(); |
| } |
| |
| Error::Type TestPopAnyProfile(Manager *manager) { |
| Error error; |
| manager->PopAnyProfile(&error); |
| return error.type(); |
| } |
| |
| Error::Type TestPopAllUserProfiles(Manager *manager) { |
| Error error; |
| manager->PopAllUserProfiles(&error); |
| return error.type(); |
| } |
| |
| Error::Type TestPopProfile(Manager *manager, const string &name) { |
| Error error; |
| manager->PopProfile(name, &error); |
| return error.type(); |
| } |
| |
| Error::Type TestPushProfile(Manager *manager, const string &name) { |
| Error error; |
| string path; |
| manager->PushProfile(name, &path, &error); |
| return error.type(); |
| } |
| |
| Error::Type TestInsertUserProfile(Manager *manager, |
| const string &name, |
| const string &user_hash) { |
| Error error; |
| string path; |
| manager->InsertUserProfile(name, user_hash, &path, &error); |
| return error.type(); |
| } |
| |
| scoped_refptr<MockProfile> AddNamedMockProfileToManager( |
| Manager *manager, const string &name) { |
| scoped_refptr<MockProfile> profile( |
| new MockProfile(control_interface(), metrics(), manager, "")); |
| EXPECT_CALL(*profile, GetRpcIdentifier()).WillRepeatedly(Return(name)); |
| EXPECT_CALL(*profile, UpdateDevice(_)).WillRepeatedly(Return(false)); |
| AdoptProfile(manager, profile); |
| return profile; |
| } |
| |
| void AddMockProfileToManager(Manager *manager) { |
| AddNamedMockProfileToManager(manager, "/"); |
| } |
| |
| void CompleteServiceSort() { |
| EXPECT_FALSE(manager()->sort_services_task_.IsCancelled()); |
| dispatcher()->DispatchPendingEvents(); |
| EXPECT_TRUE(manager()->sort_services_task_.IsCancelled()); |
| } |
| |
| RpcIdentifier GetDefaultServiceRpcIdentifier() { |
| return manager()->GetDefaultServiceRpcIdentifier(NULL); |
| } |
| |
| void SetResolver(Resolver *resolver) { |
| manager()->resolver_ = resolver; |
| } |
| |
| bool SetIgnoredDNSSearchPaths(const string &search_paths, Error *error) { |
| return manager()->SetIgnoredDNSSearchPaths(search_paths, error); |
| } |
| |
| bool SetCheckPortalList(const string &check_portal_list, Error *error) { |
| return manager()->SetCheckPortalList(check_portal_list, error); |
| } |
| |
| const string &GetIgnoredDNSSearchPaths() { |
| return manager()->props_.ignored_dns_search_paths; |
| } |
| |
| WiFiServiceRefPtr ReleaseTempMockService() { |
| // Take a reference to hold during this function. |
| WiFiServiceRefPtr temp_service = temp_mock_service_; |
| temp_mock_service_ = NULL; |
| return temp_service; |
| } |
| |
| protected: |
| typedef scoped_refptr<MockService> MockServiceRefPtr; |
| |
| class ServiceWatcher : public base::SupportsWeakPtr<ServiceWatcher> { |
| public: |
| ServiceWatcher() {} |
| virtual ~ServiceWatcher() {} |
| |
| MOCK_METHOD1(OnDefaultServiceChanged, void(const ServiceRefPtr &service)); |
| |
| private: |
| DISALLOW_COPY_AND_ASSIGN(ServiceWatcher); |
| }; |
| |
| class TestProxyFactory : public ProxyFactory { |
| public: |
| TestProxyFactory() {} |
| |
| virtual PowerManagerProxyInterface *CreatePowerManagerProxy( |
| PowerManagerProxyDelegate */*delegate*/) { |
| return NULL; |
| } |
| |
| private: |
| DISALLOW_COPY_AND_ASSIGN(TestProxyFactory); |
| }; |
| |
| class TerminationActionTest : |
| public base::SupportsWeakPtr<TerminationActionTest> { |
| public: |
| static const char kActionName[]; |
| |
| TerminationActionTest() : manager_(NULL) {} |
| virtual ~TerminationActionTest() {} |
| |
| MOCK_METHOD1(Done, void(const Error &error)); |
| |
| void Action() { |
| manager_->TerminationActionComplete("action"); |
| } |
| |
| void set_manager(Manager *manager) { manager_ = manager; } |
| |
| private: |
| Manager *manager_; |
| DISALLOW_COPY_AND_ASSIGN(TerminationActionTest); |
| }; |
| |
| class DestinationVerificationTest : |
| public base::SupportsWeakPtr<DestinationVerificationTest> { |
| public: |
| DestinationVerificationTest() {} |
| virtual ~DestinationVerificationTest() {} |
| |
| MOCK_METHOD2(ResultBoolCallbackStub, void(const Error &result, bool flag)); |
| MOCK_METHOD2(ResultStringCallbackStub, void(const Error &result, |
| const string &value)); |
| private: |
| DISALLOW_COPY_AND_ASSIGN(DestinationVerificationTest); |
| }; |
| |
| class DisableTechnologyReplyHandler : |
| public base::SupportsWeakPtr<DisableTechnologyReplyHandler> { |
| public: |
| DisableTechnologyReplyHandler() {} |
| virtual ~DisableTechnologyReplyHandler() {} |
| |
| MOCK_METHOD1(ReportResult, void(const Error &)); |
| |
| private: |
| DISALLOW_COPY_AND_ASSIGN(DisableTechnologyReplyHandler); |
| }; |
| |
| void SetPowerState(PowerManagerProxyDelegate::SuspendState state) { |
| power_manager_->power_state_ = state; |
| } |
| |
| void SetPowerManager() { |
| manager()->set_power_manager(power_manager_.release()); |
| } |
| |
| HookTable *GetTerminationActions() { |
| return &manager()->termination_actions_; |
| } |
| |
| void OnPowerStateChanged(PowerManagerProxyDelegate::SuspendState state) { |
| manager()->OnPowerStateChanged(state); |
| } |
| |
| void OnSuspendImminent(int suspend_id) { |
| manager()->OnSuspendImminent(suspend_id); |
| } |
| |
| void OnSuspendActionsComplete(int suspend_id, const Error &error) { |
| manager()->OnSuspendActionsComplete(suspend_id, error); |
| } |
| |
| vector<string> EnumerateAvailableServices() { |
| return manager()->EnumerateAvailableServices(NULL); |
| } |
| |
| vector<string> EnumerateWatchedServices() { |
| return manager()->EnumerateWatchedServices(NULL); |
| } |
| |
| MockServiceRefPtr MakeAutoConnectableService() { |
| MockServiceRefPtr service = new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager()); |
| service->MakeFavorite(); |
| service->SetConnectable(true); |
| return service; |
| } |
| |
| void SetEapProviderService(const ServiceRefPtr &service) { |
| ethernet_eap_provider_->set_service(service); |
| } |
| |
| TestProxyFactory proxy_factory_; |
| scoped_ptr<MockPowerManager> power_manager_; |
| vector<scoped_refptr<MockDevice> > mock_devices_; |
| scoped_ptr<MockDeviceInfo> device_info_; |
| |
| // This service is held for the manager, and given ownership in a mock |
| // function. This ensures that when the Manager takes ownership, there |
| // is only one reference left. |
| scoped_refptr<MockWiFiService> temp_mock_service_; |
| |
| // These pointers are owned by the manager, and only tracked here for |
| // EXPECT*() |
| ManagerMockAdaptor *manager_adaptor_; |
| MockEthernetEapProvider *ethernet_eap_provider_; |
| MockWiFiProvider *wifi_provider_; |
| MockCryptoUtilProxy *crypto_util_proxy_; |
| }; |
| |
| const char ManagerTest::TerminationActionTest::kActionName[] = "action"; |
| |
| bool ManagerTest::ServiceOrderIs(ServiceRefPtr svc0, ServiceRefPtr svc1) { |
| if (!manager()->sort_services_task_.IsCancelled()) { |
| manager()->SortServicesTask(); |
| } |
| return (svc0.get() == manager()->services_[0].get() && |
| svc1.get() == manager()->services_[1].get()); |
| } |
| |
| void SetErrorPermissionDenied(Error *error) { |
| error->Populate(Error::kPermissionDenied); |
| } |
| |
| TEST_F(ManagerTest, Contains) { |
| EXPECT_TRUE(manager()->store().Contains(flimflam::kStateProperty)); |
| EXPECT_FALSE(manager()->store().Contains("")); |
| } |
| |
| TEST_F(ManagerTest, DeviceRegistration) { |
| ON_CALL(*mock_devices_[0].get(), technology()) |
| .WillByDefault(Return(Technology::kEthernet)); |
| ON_CALL(*mock_devices_[1].get(), technology()) |
| .WillByDefault(Return(Technology::kWifi)); |
| ON_CALL(*mock_devices_[2].get(), technology()) |
| .WillByDefault(Return(Technology::kCellular)); |
| |
| manager()->RegisterDevice(mock_devices_[0]); |
| manager()->RegisterDevice(mock_devices_[1]); |
| manager()->RegisterDevice(mock_devices_[2]); |
| |
| EXPECT_TRUE(IsDeviceRegistered(mock_devices_[0], Technology::kEthernet)); |
| EXPECT_TRUE(IsDeviceRegistered(mock_devices_[1], Technology::kWifi)); |
| EXPECT_TRUE(IsDeviceRegistered(mock_devices_[2], Technology::kCellular)); |
| } |
| |
| TEST_F(ManagerTest, DeviceRegistrationAndStart) { |
| manager()->running_ = true; |
| mock_devices_[0]->enabled_persistent_ = true; |
| mock_devices_[1]->enabled_persistent_ = false; |
| EXPECT_CALL(*mock_devices_[0].get(), SetEnabled(true)) |
| .Times(1); |
| EXPECT_CALL(*mock_devices_[1].get(), SetEnabled(_)) |
| .Times(0); |
| manager()->RegisterDevice(mock_devices_[0]); |
| manager()->RegisterDevice(mock_devices_[1]); |
| } |
| |
| TEST_F(ManagerTest, DeviceRegistrationWithProfile) { |
| MockProfile *profile = |
| new MockProfile(control_interface(), metrics(), manager(), ""); |
| DeviceRefPtr device_ref(mock_devices_[0].get()); |
| AdoptProfile(manager(), profile); // Passes ownership. |
| EXPECT_CALL(*profile, ConfigureDevice(device_ref)); |
| EXPECT_CALL(*profile, UpdateDevice(device_ref)); |
| manager()->RegisterDevice(mock_devices_[0]); |
| } |
| |
| TEST_F(ManagerTest, DeviceDeregistration) { |
| ON_CALL(*mock_devices_[0].get(), technology()) |
| .WillByDefault(Return(Technology::kEthernet)); |
| ON_CALL(*mock_devices_[1].get(), technology()) |
| .WillByDefault(Return(Technology::kWifi)); |
| |
| manager()->RegisterDevice(mock_devices_[0]); |
| manager()->RegisterDevice(mock_devices_[1]); |
| |
| ASSERT_TRUE(IsDeviceRegistered(mock_devices_[0], Technology::kEthernet)); |
| ASSERT_TRUE(IsDeviceRegistered(mock_devices_[1], Technology::kWifi)); |
| |
| MockProfile *profile = |
| new MockProfile(control_interface(), metrics(), manager(), ""); |
| AdoptProfile(manager(), profile); // Passes ownership. |
| |
| EXPECT_CALL(*mock_devices_[0].get(), SetEnabled(false)); |
| EXPECT_CALL(*profile, UpdateDevice(DeviceRefPtr(mock_devices_[0]))); |
| manager()->DeregisterDevice(mock_devices_[0]); |
| EXPECT_FALSE(IsDeviceRegistered(mock_devices_[0], Technology::kEthernet)); |
| |
| EXPECT_CALL(*mock_devices_[1].get(), SetEnabled(false)); |
| EXPECT_CALL(*profile, UpdateDevice(DeviceRefPtr(mock_devices_[1]))); |
| manager()->DeregisterDevice(mock_devices_[1]); |
| EXPECT_FALSE(IsDeviceRegistered(mock_devices_[1], Technology::kWifi)); |
| } |
| |
| TEST_F(ManagerTest, ServiceRegistration) { |
| // It's much easier and safer to use a real GLib for this test. |
| GLib glib; |
| Manager manager(control_interface(), |
| dispatcher(), |
| metrics(), |
| &glib, |
| run_path(), |
| storage_path(), |
| string()); |
| ProfileRefPtr profile(CreateProfileForManager(&manager, &glib)); |
| ASSERT_TRUE(profile.get()); |
| AdoptProfile(&manager, profile); |
| |
| scoped_refptr<MockService> mock_service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| &manager)); |
| scoped_refptr<MockService> mock_service2( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| &manager)); |
| |
| string service1_name(mock_service->unique_name()); |
| string service2_name(mock_service2->unique_name()); |
| |
| EXPECT_CALL(*mock_service.get(), GetRpcIdentifier()) |
| .WillRepeatedly(Return(service1_name)); |
| EXPECT_CALL(*mock_service2.get(), GetRpcIdentifier()) |
| .WillRepeatedly(Return(service2_name)); |
| // TODO(quiche): make this EXPECT_CALL work (crbug.com/203247) |
| // EXPECT_CALL(*dynamic_cast<ManagerMockAdaptor *>(manager.adaptor_.get()), |
| // EmitRpcIdentifierArrayChanged(flimflam::kServicesProperty, _)); |
| |
| manager.RegisterService(mock_service); |
| manager.RegisterService(mock_service2); |
| |
| Error error; |
| vector<string> rpc_ids = manager.EnumerateAvailableServices(&error); |
| set<string> ids(rpc_ids.begin(), rpc_ids.end()); |
| EXPECT_EQ(2, ids.size()); |
| EXPECT_TRUE(ContainsKey(ids, mock_service->GetRpcIdentifier())); |
| EXPECT_TRUE(ContainsKey(ids, mock_service2->GetRpcIdentifier())); |
| |
| EXPECT_TRUE(manager.FindService(service1_name).get() != NULL); |
| EXPECT_TRUE(manager.FindService(service2_name).get() != NULL); |
| |
| manager.Stop(); |
| } |
| |
| TEST_F(ManagerTest, RegisterKnownService) { |
| // It's much easier and safer to use a real GLib for this test. |
| GLib glib; |
| Manager manager(control_interface(), |
| dispatcher(), |
| metrics(), |
| &glib, |
| run_path(), |
| storage_path(), |
| string()); |
| ProfileRefPtr profile(CreateProfileForManager(&manager, &glib)); |
| ASSERT_TRUE(profile.get()); |
| AdoptProfile(&manager, profile); |
| { |
| ServiceRefPtr service1(new ServiceUnderTest(control_interface(), |
| dispatcher(), |
| metrics(), |
| &manager)); |
| ASSERT_TRUE(profile->AdoptService(service1)); |
| ASSERT_TRUE(profile->ContainsService(service1)); |
| } // Force destruction of service1. |
| |
| ServiceRefPtr service2(new ServiceUnderTest(control_interface(), |
| dispatcher(), |
| metrics(), |
| &manager)); |
| manager.RegisterService(service2); |
| EXPECT_EQ(service2->profile().get(), profile.get()); |
| manager.Stop(); |
| } |
| |
| TEST_F(ManagerTest, RegisterUnknownService) { |
| // It's much easier and safer to use a real GLib for this test. |
| GLib glib; |
| Manager manager(control_interface(), |
| dispatcher(), |
| metrics(), |
| &glib, |
| run_path(), |
| storage_path(), |
| string()); |
| ProfileRefPtr profile(CreateProfileForManager(&manager, &glib)); |
| ASSERT_TRUE(profile.get()); |
| AdoptProfile(&manager, profile); |
| { |
| ServiceRefPtr service1(new ServiceUnderTest(control_interface(), |
| dispatcher(), |
| metrics(), |
| &manager)); |
| ASSERT_TRUE(profile->AdoptService(service1)); |
| ASSERT_TRUE(profile->ContainsService(service1)); |
| } // Force destruction of service1. |
| scoped_refptr<MockService> mock_service2( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| &manager)); |
| EXPECT_CALL(*mock_service2.get(), GetStorageIdentifier()) |
| .WillRepeatedly(Return(mock_service2->unique_name())); |
| manager.RegisterService(mock_service2); |
| EXPECT_NE(mock_service2->profile().get(), profile.get()); |
| manager.Stop(); |
| } |
| |
| TEST_F(ManagerTest, DeregisterUnregisteredService) { |
| // WiFi assumes that it can deregister a service that is not |
| // registered. (E.g. a hidden service can be deregistered when it |
| // loses its last endpoint, and again when WiFi is Stop()-ed.) |
| // |
| // So test that doing so doesn't cause a crash. |
| MockServiceRefPtr service = new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager()); |
| manager()->DeregisterService(service); |
| } |
| |
| TEST_F(ManagerTest, GetProperties) { |
| AddMockProfileToManager(manager()); |
| map<string, ::DBus::Variant> props; |
| Error error(Error::kInvalidProperty, ""); |
| { |
| ::DBus::Error dbus_error; |
| string expected("portal_list"); |
| manager()->mutable_store()->SetStringProperty( |
| flimflam::kCheckPortalListProperty, |
| expected, |
| &error); |
| DBusAdaptor::GetProperties(manager()->store(), &props, &dbus_error); |
| ASSERT_FALSE(props.find(flimflam::kCheckPortalListProperty) == props.end()); |
| EXPECT_EQ(props[flimflam::kCheckPortalListProperty].reader().get_string(), |
| expected); |
| } |
| { |
| ::DBus::Error dbus_error; |
| bool expected = true; |
| manager()->mutable_store()->SetBoolProperty(flimflam::kOfflineModeProperty, |
| expected, |
| &error); |
| DBusAdaptor::GetProperties(manager()->store(), &props, &dbus_error); |
| ASSERT_FALSE(props.find(flimflam::kOfflineModeProperty) == props.end()); |
| EXPECT_EQ(props[flimflam::kOfflineModeProperty].reader().get_bool(), |
| expected); |
| } |
| } |
| |
| TEST_F(ManagerTest, GetDevicesProperty) { |
| AddMockProfileToManager(manager()); |
| manager()->RegisterDevice(mock_devices_[0]); |
| manager()->RegisterDevice(mock_devices_[1]); |
| { |
| map<string, ::DBus::Variant> props; |
| ::DBus::Error dbus_error; |
| DBusAdaptor::GetProperties(manager()->store(), &props, &dbus_error); |
| ASSERT_FALSE(props.find(flimflam::kDevicesProperty) == props.end()); |
| vector < ::DBus::Path> devices = |
| props[flimflam::kDevicesProperty].operator vector< ::DBus::Path>(); |
| EXPECT_EQ(2, devices.size()); |
| } |
| } |
| |
| TEST_F(ManagerTest, GetServicesProperty) { |
| AddMockProfileToManager(manager()); |
| map<string, ::DBus::Variant> props; |
| ::DBus::Error dbus_error; |
| DBusAdaptor::GetProperties(manager()->store(), &props, &dbus_error); |
| map<string, ::DBus::Variant>::const_iterator prop = |
| props.find(flimflam::kServicesProperty); |
| ASSERT_FALSE(prop == props.end()); |
| const ::DBus::Variant &variant = prop->second; |
| ASSERT_TRUE(DBusAdaptor::IsPaths(variant.signature())); |
| } |
| |
| TEST_F(ManagerTest, MoveService) { |
| Manager manager(control_interface(), |
| dispatcher(), |
| metrics(), |
| glib(), |
| run_path(), |
| storage_path(), |
| string()); |
| scoped_refptr<MockService> s2(new MockService(control_interface(), |
| dispatcher(), |
| metrics(), |
| &manager)); |
| // Inject an actual profile, backed by a fake StoreInterface |
| { |
| Profile::Identifier id("irrelevant"); |
| ProfileRefPtr profile( |
| new Profile(control_interface(), metrics(), &manager, id, "", false)); |
| MockStore *storage = new MockStore; |
| EXPECT_CALL(*storage, ContainsGroup(s2->GetStorageIdentifier())) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*storage, Flush()) |
| .Times(AnyNumber()) |
| .WillRepeatedly(Return(true)); |
| profile->set_storage(storage); |
| AdoptProfile(&manager, profile); |
| } |
| // Create a profile that already has |s2| in it. |
| ProfileRefPtr profile( |
| new EphemeralProfile(control_interface(), metrics(), &manager)); |
| EXPECT_TRUE(profile->AdoptService(s2)); |
| |
| // Now, move the Service |s2| to another profile. |
| EXPECT_CALL(*s2.get(), Save(_)).WillOnce(Return(true)); |
| ASSERT_TRUE(manager.MoveServiceToProfile(s2, manager.ActiveProfile())); |
| |
| // Force destruction of the original Profile, to ensure that the Service |
| // is kept alive and populated with data. |
| profile = NULL; |
| ASSERT_TRUE(manager.ActiveProfile()->ContainsService(s2)); |
| manager.Stop(); |
| } |
| |
| TEST_F(ManagerTest, LookupProfileByRpcIdentifier) { |
| scoped_refptr<MockProfile> mock_profile( |
| new MockProfile(control_interface(), metrics(), manager(), "")); |
| const string kProfileName("profile0"); |
| EXPECT_CALL(*mock_profile, GetRpcIdentifier()) |
| .WillRepeatedly(Return(kProfileName)); |
| AdoptProfile(manager(), mock_profile); |
| |
| EXPECT_FALSE(manager()->LookupProfileByRpcIdentifier("foo")); |
| ProfileRefPtr profile = manager()->LookupProfileByRpcIdentifier(kProfileName); |
| EXPECT_EQ(mock_profile.get(), profile.get()); |
| } |
| |
| TEST_F(ManagerTest, SetProfileForService) { |
| scoped_refptr<MockProfile> profile0( |
| new MockProfile(control_interface(), metrics(), manager(), "")); |
| string profile_name0("profile0"); |
| EXPECT_CALL(*profile0, GetRpcIdentifier()) |
| .WillRepeatedly(Return(profile_name0)); |
| AdoptProfile(manager(), profile0); |
| scoped_refptr<MockService> service(new MockService(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| EXPECT_FALSE(manager()->HasService(service)); |
| { |
| Error error; |
| EXPECT_CALL(*profile0, AdoptService(_)) |
| .WillOnce(Return(true)); |
| // Expect that setting the profile of a service that does not already |
| // have one assigned does not cause a crash. |
| manager()->SetProfileForService(service, "profile0", &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| } |
| |
| // The service should be registered as a side-effect of the profile being |
| // set for this service. |
| EXPECT_TRUE(manager()->HasService(service)); |
| |
| // Since we have mocked Profile::AdoptServie() above, the service's |
| // profile was not actually changed. Do so explicitly now. |
| service->set_profile(profile0); |
| |
| { |
| Error error; |
| manager()->SetProfileForService(service, "foo", &error); |
| EXPECT_EQ(Error::kInvalidArguments, error.type()); |
| EXPECT_EQ("Unknown Profile foo requested for Service", error.message()); |
| } |
| |
| { |
| Error error; |
| manager()->SetProfileForService(service, profile_name0, &error); |
| EXPECT_EQ(Error::kInvalidArguments, error.type()); |
| EXPECT_EQ("Service is already connected to this profile", error.message()); |
| } |
| |
| scoped_refptr<MockProfile> profile1( |
| new MockProfile(control_interface(), metrics(), manager(), "")); |
| string profile_name1("profile1"); |
| EXPECT_CALL(*profile1, GetRpcIdentifier()) |
| .WillRepeatedly(Return(profile_name1)); |
| AdoptProfile(manager(), profile1); |
| |
| { |
| Error error; |
| EXPECT_CALL(*profile1, AdoptService(_)) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*profile0, AbandonService(_)) |
| .WillOnce(Return(true)); |
| manager()->SetProfileForService(service, profile_name1, &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| } |
| } |
| |
| TEST_F(ManagerTest, CreateProfile) { |
| // It's much easier to use real Glib here since we want the storage |
| // side-effects. |
| GLib glib; |
| ScopedTempDir temp_dir; |
| ASSERT_TRUE(temp_dir.CreateUniqueTempDir()); |
| |
| Manager manager(control_interface(), |
| dispatcher(), |
| metrics(), |
| &glib, |
| run_path(), |
| storage_path(), |
| temp_dir.path().value()); |
| |
| // Invalid name should be rejected. |
| EXPECT_EQ(Error::kInvalidArguments, TestCreateProfile(&manager, "")); |
| |
| // A profile with invalid characters in it should similarly be rejected. |
| EXPECT_EQ(Error::kInvalidArguments, |
| TestCreateProfile(&manager, "valid_profile")); |
| |
| // We should be able to create a machine profile. |
| EXPECT_EQ(Error::kSuccess, TestCreateProfile(&manager, "valid")); |
| |
| // We should succeed in creating a valid user profile. Verify the returned |
| // path. |
| const char kProfile[] = "~user/profile"; |
| { |
| Error error; |
| string path; |
| manager.CreateProfile(kProfile, &path, &error); |
| EXPECT_EQ(Error::kSuccess, error.type()); |
| EXPECT_EQ("/profile_rpc", path); |
| } |
| |
| // We should fail in creating it a second time (already exists). |
| EXPECT_EQ(Error::kAlreadyExists, TestCreateProfile(&manager, kProfile)); |
| } |
| |
| // We receive PopProfile when a user logs out, and it should always trigger a |
| // MemoryLog Clear() call. |
| TEST_F(ManagerTest, PopProfileShouldClearMemoryLog) { |
| GLib glib; |
| ScopedTempDir temp_dir; |
| ASSERT_TRUE(temp_dir.CreateUniqueTempDir()); |
| Manager manager(control_interface(), |
| dispatcher(), |
| metrics(), |
| &glib, |
| run_path(), |
| storage_path(), |
| temp_dir.path().value()); |
| const char kProfile0[] = "~user/profile0"; |
| const char kPurgedMessage[] = "This message should be purged"; |
| // Create a profile and push it on the stack, leave one uncreated |
| ASSERT_EQ(Error::kSuccess, TestCreateProfile(&manager, kProfile0)); |
| EXPECT_EQ(Error::kSuccess, TestPushProfile(&manager, kProfile0)); |
| |
| // Popping a profile which isn't on top should still clear the log. |
| LOG(INFO) << kPurgedMessage; |
| EXPECT_TRUE(MemoryLog::GetInstance()->TestContainsMessageWithText( |
| kPurgedMessage)); |
| EXPECT_EQ(Error::kNotSupported, TestPopProfile(&manager, "~user/profile1")); |
| EXPECT_FALSE(MemoryLog::GetInstance()->TestContainsMessageWithText( |
| kPurgedMessage)); |
| |
| // Popping an invalid profile name should do the same thing. |
| LOG(INFO) << kPurgedMessage; |
| EXPECT_TRUE(MemoryLog::GetInstance()->TestContainsMessageWithText( |
| kPurgedMessage)); |
| EXPECT_EQ(Error::kInvalidArguments, TestPopProfile(&manager, "~")); |
| EXPECT_FALSE(MemoryLog::GetInstance()->TestContainsMessageWithText( |
| kPurgedMessage)); |
| |
| // Successful pops also purge the message log. |
| LOG(INFO) << kPurgedMessage; |
| EXPECT_TRUE(MemoryLog::GetInstance()->TestContainsMessageWithText( |
| kPurgedMessage)); |
| EXPECT_EQ(Error::kSuccess, TestPopProfile(&manager, kProfile0)); |
| EXPECT_FALSE(MemoryLog::GetInstance()->TestContainsMessageWithText( |
| kPurgedMessage)); |
| } |
| |
| TEST_F(ManagerTest, PushPopProfile) { |
| // It's much easier to use real Glib in creating a Manager for this |
| // test here since we want the storage side-effects. |
| GLib glib; |
| ScopedTempDir temp_dir; |
| ASSERT_TRUE(temp_dir.CreateUniqueTempDir()); |
| Manager manager(control_interface(), |
| dispatcher(), |
| metrics(), |
| &glib, |
| run_path(), |
| storage_path(), |
| temp_dir.path().value()); |
| |
| // Pushing an invalid profile should fail. |
| EXPECT_EQ(Error::kInvalidArguments, TestPushProfile(&manager, "")); |
| |
| // Pushing a default profile that does not exist should fail. |
| EXPECT_EQ(Error::kNotFound, TestPushProfile(&manager, "default")); |
| |
| const char kProfile0[] = "~user/profile0"; |
| const char kProfile1[] = "~user/profile1"; |
| |
| // Create a couple of profiles. |
| ASSERT_EQ(Error::kSuccess, TestCreateProfile(&manager, kProfile0)); |
| ASSERT_EQ(Error::kSuccess, TestCreateProfile(&manager, kProfile1)); |
| |
| // Push these profiles on the stack. |
| EXPECT_EQ(Error::kSuccess, TestPushProfile(&manager, kProfile0)); |
| EXPECT_EQ(Error::kSuccess, TestPushProfile(&manager, kProfile1)); |
| |
| // Pushing a profile a second time should fail. |
| EXPECT_EQ(Error::kAlreadyExists, TestPushProfile(&manager, kProfile0)); |
| EXPECT_EQ(Error::kAlreadyExists, TestPushProfile(&manager, kProfile1)); |
| |
| Error error; |
| // Active profile should be the last one we pushed. |
| EXPECT_EQ(kProfile1, "~" + manager.ActiveProfile()->GetFriendlyName()); |
| |
| // Make sure a profile name that doesn't exist fails. |
| const char kProfile2Id[] = "profile2"; |
| const string kProfile2 = base::StringPrintf("~user/%s", kProfile2Id); |
| EXPECT_EQ(Error::kNotFound, TestPushProfile(&manager, kProfile2)); |
| |
| // Create a new service, with a specific storage name. |
| scoped_refptr<MockService> service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| &manager)); |
| const char kServiceName[] = "service_storage_name"; |
| EXPECT_CALL(*service.get(), GetStorageIdentifier()) |
| .WillRepeatedly(Return(kServiceName)); |
| EXPECT_CALL(*service.get(), Load(_)) |
| .WillRepeatedly(Return(true)); |
| |
| // Add this service to the manager -- it should end up in the ephemeral |
| // profile. |
| manager.RegisterService(service); |
| ASSERT_EQ(GetEphemeralProfile(&manager), service->profile()); |
| |
| // Create storage for a profile that contains the service storage name. |
| ASSERT_TRUE(CreateBackingStoreForService(&temp_dir, kProfile2Id, |
| kServiceName)); |
| |
| // When we push the profile, the service should move away from the |
| // ephemeral profile to this new profile since it has an entry for |
| // this service. |
| EXPECT_EQ(Error::kSuccess, TestPushProfile(&manager, kProfile2)); |
| EXPECT_NE(GetEphemeralProfile(&manager), service->profile()); |
| EXPECT_EQ(kProfile2, "~" + service->profile()->GetFriendlyName()); |
| |
| // Insert another profile that should supersede ownership of the service. |
| const char kProfile3Id[] = "profile3"; |
| const string kProfile3 = base::StringPrintf("~user/%s", kProfile3Id); |
| ASSERT_TRUE(CreateBackingStoreForService(&temp_dir, kProfile3Id, |
| kServiceName)); |
| EXPECT_EQ(Error::kSuccess, TestPushProfile(&manager, kProfile3)); |
| EXPECT_EQ(kProfile3, "~" + service->profile()->GetFriendlyName()); |
| |
| // Popping an invalid profile name should fail. |
| EXPECT_EQ(Error::kInvalidArguments, TestPopProfile(&manager, "~")); |
| |
| // Popping an profile that is not at the top of the stack should fail. |
| EXPECT_EQ(Error::kNotSupported, TestPopProfile(&manager, kProfile0)); |
| |
| // Popping the top profile should succeed. |
| EXPECT_EQ(Error::kSuccess, TestPopProfile(&manager, kProfile3)); |
| |
| // Moreover the service should have switched profiles to profile 2. |
| EXPECT_EQ(kProfile2, "~" + service->profile()->GetFriendlyName()); |
| |
| // Popping the top profile should succeed. |
| EXPECT_EQ(Error::kSuccess, TestPopAnyProfile(&manager)); |
| |
| // The service should now revert to the ephemeral profile. |
| EXPECT_EQ(GetEphemeralProfile(&manager), service->profile()); |
| |
| // Pop the remaining two services off the stack. |
| EXPECT_EQ(Error::kSuccess, TestPopAnyProfile(&manager)); |
| EXPECT_EQ(Error::kSuccess, TestPopAnyProfile(&manager)); |
| |
| // Next pop should fail with "stack is empty". |
| EXPECT_EQ(Error::kNotFound, TestPopAnyProfile(&manager)); |
| |
| const char kMachineProfile0[] = "machineprofile0"; |
| const char kMachineProfile1[] = "machineprofile1"; |
| ASSERT_EQ(Error::kSuccess, TestCreateProfile(&manager, kMachineProfile0)); |
| ASSERT_EQ(Error::kSuccess, TestCreateProfile(&manager, kMachineProfile1)); |
| |
| // Should be able to push a machine profile. |
| EXPECT_EQ(Error::kSuccess, TestPushProfile(&manager, kMachineProfile0)); |
| |
| // Should be able to push a user profile atop a machine profile. |
| EXPECT_EQ(Error::kSuccess, TestPushProfile(&manager, kProfile0)); |
| |
| // Pushing a system-wide profile on top of a user profile should fail. |
| EXPECT_EQ(Error::kInvalidArguments, |
| TestPushProfile(&manager, kMachineProfile1)); |
| |
| // However if we pop the user profile, we should be able stack another |
| // machine profile on. |
| EXPECT_EQ(Error::kSuccess, TestPopAnyProfile(&manager)); |
| EXPECT_EQ(Error::kSuccess, TestPushProfile(&manager, kMachineProfile1)); |
| |
| // Add two user profiles to the top of the stack. |
| EXPECT_EQ(Error::kSuccess, TestPushProfile(&manager, kProfile0)); |
| EXPECT_EQ(Error::kSuccess, TestPushProfile(&manager, kProfile1)); |
| vector<ProfileRefPtr> &profiles = GetProfiles(&manager); |
| EXPECT_EQ(4, profiles.size()); |
| |
| // PopAllUserProfiles should remove both user profiles, leaving the two |
| // machine profiles. |
| EXPECT_EQ(Error::kSuccess, TestPopAllUserProfiles(&manager)); |
| EXPECT_EQ(2, profiles.size()); |
| EXPECT_TRUE(profiles[0]->GetUser().empty()); |
| EXPECT_TRUE(profiles[1]->GetUser().empty()); |
| |
| // Use InsertUserProfile() instead. Although a machine profile is valid |
| // in this state, it cannot be added via InsertUserProfile. |
| EXPECT_EQ(Error::kSuccess, TestPopProfile(&manager, kMachineProfile1)); |
| EXPECT_EQ(Error::kInvalidArguments, |
| TestInsertUserProfile(&manager, kMachineProfile1, "machinehash1")); |
| const char kUserHash0[] = "userhash0"; |
| const char kUserHash1[] = "userhash1"; |
| EXPECT_EQ(Error::kSuccess, |
| TestInsertUserProfile(&manager, kProfile0, kUserHash0)); |
| EXPECT_EQ(Error::kSuccess, |
| TestInsertUserProfile(&manager, kProfile1, kUserHash1)); |
| EXPECT_EQ(3, profiles.size()); |
| EXPECT_EQ(kUserHash0, profiles[1]->GetUserHash()); |
| EXPECT_EQ(kUserHash1, profiles[2]->GetUserHash()); |
| } |
| |
| TEST_F(ManagerTest, RemoveProfile) { |
| // It's much easier to use real Glib in creating a Manager for this |
| // test here since we want the storage side-effects. |
| GLib glib; |
| ScopedTempDir temp_dir; |
| ASSERT_TRUE(temp_dir.CreateUniqueTempDir()); |
| Manager manager(control_interface(), |
| dispatcher(), |
| metrics(), |
| &glib, |
| run_path(), |
| storage_path(), |
| temp_dir.path().value()); |
| |
| const char kProfile0[] = "profile0"; |
| FilePath profile_path( |
| FilePath(storage_path()).Append(string(kProfile0) + ".profile")); |
| |
| ASSERT_EQ(Error::kSuccess, TestCreateProfile(&manager, kProfile0)); |
| ASSERT_TRUE(file_util::PathExists(profile_path)); |
| |
| EXPECT_EQ(Error::kSuccess, TestPushProfile(&manager, kProfile0)); |
| |
| // Remove should fail since the profile is still on the stack. |
| { |
| Error error; |
| manager.RemoveProfile(kProfile0, &error); |
| EXPECT_EQ(Error::kInvalidArguments, error.type()); |
| } |
| |
| // Profile path should still exist. |
| EXPECT_TRUE(file_util::PathExists(profile_path)); |
| |
| EXPECT_EQ(Error::kSuccess, TestPopAnyProfile(&manager)); |
| |
| // This should succeed now that the profile is off the stack. |
| { |
| Error error; |
| manager.RemoveProfile(kProfile0, &error); |
| EXPECT_EQ(Error::kSuccess, error.type()); |
| } |
| |
| // Profile path should no longer exist. |
| EXPECT_FALSE(file_util::PathExists(profile_path)); |
| |
| // Another remove succeeds, due to a foible in file_util::Delete -- |
| // it is not an error to delete a file that does not exist. |
| { |
| Error error; |
| manager.RemoveProfile(kProfile0, &error); |
| EXPECT_EQ(Error::kSuccess, error.type()); |
| } |
| |
| // Let's create an error case that will "work". Create a non-empty |
| // directory in the place of the profile pathname. |
| ASSERT_TRUE(file_util::CreateDirectory(profile_path.Append("foo"))); |
| { |
| Error error; |
| manager.RemoveProfile(kProfile0, &error); |
| EXPECT_EQ(Error::kOperationFailed, error.type()); |
| } |
| } |
| |
| TEST_F(ManagerTest, CreateDuplicateProfileWithMissingKeyfile) { |
| // It's much easier to use real Glib in creating a Manager for this |
| // test here since we want the storage side-effects. |
| GLib glib; |
| ScopedTempDir temp_dir; |
| ASSERT_TRUE(temp_dir.CreateUniqueTempDir()); |
| Manager manager(control_interface(), |
| dispatcher(), |
| metrics(), |
| &glib, |
| run_path(), |
| storage_path(), |
| temp_dir.path().value()); |
| |
| const char kProfile0[] = "profile0"; |
| FilePath profile_path( |
| FilePath(storage_path()).Append(string(kProfile0) + ".profile")); |
| |
| ASSERT_EQ(Error::kSuccess, TestCreateProfile(&manager, kProfile0)); |
| ASSERT_TRUE(file_util::PathExists(profile_path)); |
| EXPECT_EQ(Error::kSuccess, TestPushProfile(&manager, kProfile0)); |
| |
| // Ensure that even if the backing filestore is removed, we still can't |
| // create a profile twice. |
| ASSERT_TRUE(file_util::Delete(profile_path, false)); |
| EXPECT_EQ(Error::kAlreadyExists, TestCreateProfile(&manager, kProfile0)); |
| } |
| |
| // Use this matcher instead of passing RefPtrs directly into the arguments |
| // of EXPECT_CALL() because otherwise we may create un-cleaned-up references at |
| // system teardown. |
| MATCHER_P(IsRefPtrTo, ref_address, "") { |
| return arg.get() == ref_address; |
| } |
| |
| TEST_F(ManagerTest, HandleProfileEntryDeletion) { |
| MockServiceRefPtr s_not_in_profile( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| MockServiceRefPtr s_not_in_group( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| MockServiceRefPtr s_configure_fail( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| MockServiceRefPtr s_configure_succeed( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| string entry_name("entry_name"); |
| EXPECT_CALL(*s_not_in_profile.get(), GetStorageIdentifier()).Times(0); |
| EXPECT_CALL(*s_not_in_group.get(), GetStorageIdentifier()) |
| .WillRepeatedly(Return("not_entry_name")); |
| EXPECT_CALL(*s_configure_fail.get(), GetStorageIdentifier()) |
| .WillRepeatedly(Return(entry_name)); |
| EXPECT_CALL(*s_configure_succeed.get(), GetStorageIdentifier()) |
| .WillRepeatedly(Return(entry_name)); |
| |
| manager()->RegisterService(s_not_in_profile); |
| manager()->RegisterService(s_not_in_group); |
| manager()->RegisterService(s_configure_fail); |
| manager()->RegisterService(s_configure_succeed); |
| |
| scoped_refptr<MockProfile> profile0( |
| new StrictMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| scoped_refptr<MockProfile> profile1( |
| new StrictMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| |
| s_not_in_group->set_profile(profile1); |
| s_configure_fail->set_profile(profile1); |
| s_configure_succeed->set_profile(profile1); |
| |
| AdoptProfile(manager(), profile0); |
| AdoptProfile(manager(), profile1); |
| |
| // No services are a member of this profile. |
| EXPECT_FALSE(manager()->HandleProfileEntryDeletion(profile0, entry_name)); |
| |
| // No services that are members of this profile have this entry name. |
| EXPECT_FALSE(manager()->HandleProfileEntryDeletion(profile1, "")); |
| |
| // Only services that are members of the profile and group will be abandoned. |
| EXPECT_CALL(*profile1.get(), |
| AbandonService(IsRefPtrTo(s_not_in_profile.get()))).Times(0); |
| EXPECT_CALL(*profile1.get(), |
| AbandonService(IsRefPtrTo(s_not_in_group.get()))).Times(0); |
| EXPECT_CALL(*profile1.get(), |
| AbandonService(IsRefPtrTo(s_configure_fail.get()))) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*profile1.get(), |
| AbandonService(IsRefPtrTo(s_configure_succeed.get()))) |
| .WillOnce(Return(true)); |
| |
| // Never allow services to re-join profile1. |
| EXPECT_CALL(*profile1.get(), ConfigureService(_)) |
| .WillRepeatedly(Return(false)); |
| |
| // Only allow one of the members of the profile and group to successfully |
| // join profile0. |
| EXPECT_CALL(*profile0.get(), |
| ConfigureService(IsRefPtrTo(s_not_in_profile.get()))).Times(0); |
| EXPECT_CALL(*profile0.get(), |
| ConfigureService(IsRefPtrTo(s_not_in_group.get()))).Times(0); |
| EXPECT_CALL(*profile0.get(), |
| ConfigureService(IsRefPtrTo(s_configure_fail.get()))) |
| .WillOnce(Return(false)); |
| EXPECT_CALL(*profile0.get(), |
| ConfigureService(IsRefPtrTo(s_configure_succeed.get()))) |
| .WillOnce(Return(true)); |
| |
| // Expect the failed-to-configure service to have Unload() called on it. |
| EXPECT_CALL(*s_not_in_profile.get(), Unload()).Times(0); |
| EXPECT_CALL(*s_not_in_group.get(), Unload()).Times(0); |
| EXPECT_CALL(*s_configure_fail.get(), Unload()).Times(1); |
| EXPECT_CALL(*s_configure_succeed.get(), Unload()).Times(0); |
| |
| EXPECT_TRUE(manager()->HandleProfileEntryDeletion(profile1, entry_name)); |
| |
| EXPECT_EQ(GetEphemeralProfile(manager()), s_not_in_profile->profile().get()); |
| EXPECT_EQ(profile1, s_not_in_group->profile()); |
| EXPECT_EQ(GetEphemeralProfile(manager()), s_configure_fail->profile()); |
| |
| // Since we are using a MockProfile, the profile does not actually change, |
| // since ConfigureService was not actually called on the service. |
| EXPECT_EQ(profile1, s_configure_succeed->profile()); |
| } |
| |
| TEST_F(ManagerTest, HandleProfileEntryDeletionWithUnload) { |
| MockServiceRefPtr s_will_remove0( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| MockServiceRefPtr s_will_remove1( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| MockServiceRefPtr s_will_not_remove0( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| MockServiceRefPtr s_will_not_remove1( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| EXPECT_CALL(*metrics(), NotifyDefaultServiceChanged(NULL)) |
| .Times(4); // Once for each registration. |
| |
| string entry_name("entry_name"); |
| EXPECT_CALL(*s_will_remove0.get(), GetStorageIdentifier()) |
| .WillRepeatedly(Return(entry_name)); |
| EXPECT_CALL(*s_will_remove1.get(), GetStorageIdentifier()) |
| .WillRepeatedly(Return(entry_name)); |
| EXPECT_CALL(*s_will_not_remove0.get(), GetStorageIdentifier()) |
| .WillRepeatedly(Return(entry_name)); |
| EXPECT_CALL(*s_will_not_remove1.get(), GetStorageIdentifier()) |
| .WillRepeatedly(Return(entry_name)); |
| |
| manager()->RegisterService(s_will_remove0); |
| CompleteServiceSort(); |
| manager()->RegisterService(s_will_not_remove0); |
| CompleteServiceSort(); |
| manager()->RegisterService(s_will_remove1); |
| CompleteServiceSort(); |
| manager()->RegisterService(s_will_not_remove1); |
| CompleteServiceSort(); |
| |
| // One for each service added above. |
| ASSERT_EQ(4, manager()->services_.size()); |
| |
| scoped_refptr<MockProfile> profile( |
| new StrictMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| |
| s_will_remove0->set_profile(profile); |
| s_will_remove1->set_profile(profile); |
| s_will_not_remove0->set_profile(profile); |
| s_will_not_remove1->set_profile(profile); |
| |
| AdoptProfile(manager(), profile); |
| |
| // Deny any of the services re-entry to the profile. |
| EXPECT_CALL(*profile, ConfigureService(_)) |
| .WillRepeatedly(Return(false)); |
| |
| EXPECT_CALL(*profile, AbandonService(ServiceRefPtr(s_will_remove0))) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*profile, AbandonService(ServiceRefPtr(s_will_remove1))) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*profile, AbandonService(ServiceRefPtr(s_will_not_remove0))) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*profile, AbandonService(ServiceRefPtr(s_will_not_remove1))) |
| .WillOnce(Return(true)); |
| |
| EXPECT_CALL(*s_will_remove0, Unload()) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*s_will_remove1, Unload()) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*s_will_not_remove0, Unload()) |
| .WillOnce(Return(false)); |
| EXPECT_CALL(*s_will_not_remove1, Unload()) |
| .WillOnce(Return(false)); |
| |
| |
| // This will cause all the profiles to be unloaded. |
| EXPECT_TRUE(manager()->HandleProfileEntryDeletion(profile, entry_name)); |
| |
| // 2 of the 4 services added above should have been unregistered and |
| // removed, leaving 2. |
| EXPECT_EQ(2, manager()->services_.size()); |
| EXPECT_EQ(s_will_not_remove0.get(), manager()->services_[0].get()); |
| EXPECT_EQ(s_will_not_remove1.get(), manager()->services_[1].get()); |
| } |
| |
| TEST_F(ManagerTest, PopProfileWithUnload) { |
| MockServiceRefPtr s_will_remove0( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| MockServiceRefPtr s_will_remove1( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| MockServiceRefPtr s_will_not_remove0( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| MockServiceRefPtr s_will_not_remove1( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| EXPECT_CALL(*metrics(), NotifyDefaultServiceChanged(NULL)) |
| .Times(5); // Once for each registration, and one after profile pop. |
| |
| manager()->RegisterService(s_will_remove0); |
| CompleteServiceSort(); |
| manager()->RegisterService(s_will_not_remove0); |
| CompleteServiceSort(); |
| manager()->RegisterService(s_will_remove1); |
| CompleteServiceSort(); |
| manager()->RegisterService(s_will_not_remove1); |
| CompleteServiceSort(); |
| |
| // One for each service added above. |
| ASSERT_EQ(4, manager()->services_.size()); |
| |
| scoped_refptr<MockProfile> profile0( |
| new StrictMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| scoped_refptr<MockProfile> profile1( |
| new StrictMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| |
| s_will_remove0->set_profile(profile1); |
| s_will_remove1->set_profile(profile1); |
| s_will_not_remove0->set_profile(profile1); |
| s_will_not_remove1->set_profile(profile1); |
| |
| AdoptProfile(manager(), profile0); |
| AdoptProfile(manager(), profile1); |
| |
| // Deny any of the services entry to profile0, so they will all be unloaded. |
| EXPECT_CALL(*profile0, ConfigureService(_)) |
| .WillRepeatedly(Return(false)); |
| |
| EXPECT_CALL(*s_will_remove0, Unload()) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*s_will_remove1, Unload()) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*s_will_not_remove0, Unload()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*s_will_not_remove1, Unload()) |
| .WillOnce(Return(false)); |
| |
| // Ignore calls to Profile::GetRpcIdentifier because of emitted changes of the |
| // profile list. |
| EXPECT_CALL(*profile0, GetRpcIdentifier()).Times(AnyNumber()); |
| EXPECT_CALL(*profile1, GetRpcIdentifier()).Times(AnyNumber()); |
| |
| // This will pop profile1, which should cause all our profiles to unload. |
| manager()->PopProfileInternal(); |
| CompleteServiceSort(); |
| |
| // 2 of the 4 services added above should have been unregistered and |
| // removed, leaving 2. |
| EXPECT_EQ(2, manager()->services_.size()); |
| EXPECT_EQ(s_will_not_remove0.get(), manager()->services_[0].get()); |
| EXPECT_EQ(s_will_not_remove1.get(), manager()->services_[1].get()); |
| |
| // Expect the unloaded services to lose their profile reference. |
| EXPECT_FALSE(s_will_remove0->profile()); |
| EXPECT_FALSE(s_will_remove1->profile()); |
| |
| // If we explicitly deregister a service, the effect should be the same |
| // with respect to the profile reference. |
| ASSERT_TRUE(s_will_not_remove0->profile()); |
| manager()->DeregisterService(s_will_not_remove0); |
| EXPECT_FALSE(s_will_not_remove0->profile()); |
| } |
| |
| TEST_F(ManagerTest, SetProperty) { |
| { |
| ::DBus::Error error; |
| ::DBus::Variant offline_mode; |
| offline_mode.writer().append_bool(true); |
| EXPECT_TRUE(DBusAdaptor::SetProperty(manager()->mutable_store(), |
| flimflam::kOfflineModeProperty, |
| offline_mode, |
| &error)); |
| } |
| { |
| ::DBus::Error error; |
| ::DBus::Variant country; |
| country.writer().append_string("a_country"); |
| EXPECT_TRUE(DBusAdaptor::SetProperty(manager()->mutable_store(), |
| flimflam::kCountryProperty, |
| country, |
| &error)); |
| } |
| // Attempt to write with value of wrong type should return InvalidArgs. |
| { |
| ::DBus::Error error; |
| EXPECT_FALSE(DBusAdaptor::SetProperty(manager()->mutable_store(), |
| flimflam::kCountryProperty, |
| PropertyStoreTest::kBoolV, |
| &error)); |
| EXPECT_EQ(invalid_args(), error.name()); |
| } |
| { |
| ::DBus::Error error; |
| EXPECT_FALSE(DBusAdaptor::SetProperty(manager()->mutable_store(), |
| flimflam::kOfflineModeProperty, |
| PropertyStoreTest::kStringV, |
| &error)); |
| EXPECT_EQ(invalid_args(), error.name()); |
| } |
| // Attempt to write R/O property should return InvalidArgs. |
| { |
| ::DBus::Error error; |
| EXPECT_FALSE(DBusAdaptor::SetProperty( |
| manager()->mutable_store(), |
| flimflam::kEnabledTechnologiesProperty, |
| PropertyStoreTest::kStringsV, |
| &error)); |
| EXPECT_EQ(invalid_args(), error.name()); |
| } |
| } |
| |
| TEST_F(ManagerTest, RequestScan) { |
| { |
| Error error; |
| manager()->RegisterDevice(mock_devices_[0].get()); |
| manager()->RegisterDevice(mock_devices_[1].get()); |
| EXPECT_CALL(*mock_devices_[0], technology()) |
| .WillRepeatedly(Return(Technology::kWifi)); |
| EXPECT_CALL(*mock_devices_[0], Scan(Device::kFullScan, _, _)); |
| EXPECT_CALL(*mock_devices_[1], technology()) |
| .WillRepeatedly(Return(Technology::kUnknown)); |
| EXPECT_CALL(*mock_devices_[1], Scan(_, _, _)).Times(0); |
| manager()->RequestScan(Device::kFullScan, flimflam::kTypeWifi, &error); |
| } |
| |
| { |
| Error error; |
| manager()->RequestScan(Device::kFullScan, "bogus_device_type", &error); |
| EXPECT_EQ(Error::kInvalidArguments, error.type()); |
| } |
| } |
| |
| TEST_F(ManagerTest, GetServiceNoType) { |
| KeyValueStore args; |
| Error e; |
| manager()->GetService(args, &e); |
| EXPECT_EQ(Error::kInvalidArguments, e.type()); |
| EXPECT_EQ("must specify service type", e.message()); |
| } |
| |
| TEST_F(ManagerTest, GetServiceUnknownType) { |
| KeyValueStore args; |
| Error e; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeEthernet); |
| manager()->GetService(args, &e); |
| EXPECT_EQ(Error::kNotSupported, e.type()); |
| EXPECT_EQ("service type is unsupported", e.message()); |
| } |
| |
| TEST_F(ManagerTest, GetServiceEthernetEap) { |
| KeyValueStore args; |
| Error e; |
| ServiceRefPtr service = new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager()); |
| args.SetString(flimflam::kTypeProperty, kTypeEthernetEap); |
| SetEapProviderService(service); |
| EXPECT_EQ(service, manager()->GetService(args, &e)); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| |
| TEST_F(ManagerTest, GetServiceWifi) { |
| KeyValueStore args; |
| Error e; |
| WiFiServiceRefPtr wifi_service; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWifi); |
| EXPECT_CALL(*wifi_provider_, GetService(_, _)) |
| .WillRepeatedly(Return(wifi_service)); |
| manager()->GetService(args, &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| } |
| |
| TEST_F(ManagerTest, GetServiceVPNUnknownType) { |
| KeyValueStore args; |
| Error e; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeVPN); |
| scoped_refptr<MockProfile> profile( |
| new StrictMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| AdoptProfile(manager(), profile); |
| ServiceRefPtr service = manager()->GetService(args, &e); |
| EXPECT_EQ(Error::kNotSupported, e.type()); |
| EXPECT_FALSE(service); |
| } |
| |
| TEST_F(ManagerTest, GetServiceVPN) { |
| KeyValueStore args; |
| Error e; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeVPN); |
| args.SetString(flimflam::kProviderTypeProperty, flimflam::kProviderOpenVpn); |
| args.SetString(flimflam::kProviderHostProperty, "10.8.0.1"); |
| args.SetString(flimflam::kNameProperty, "vpn-name"); |
| scoped_refptr<MockProfile> profile( |
| new StrictMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| AdoptProfile(manager(), profile); |
| |
| #if defined(DISABLE_VPN) |
| |
| ServiceRefPtr service = manager()->GetService(args, &e); |
| EXPECT_EQ(Error::kNotSupported, e.type()); |
| EXPECT_FALSE(service); |
| |
| #else |
| |
| ServiceRefPtr updated_service; |
| EXPECT_CALL(*profile, UpdateService(_)) |
| .WillOnce(DoAll(SaveArg<0>(&updated_service), Return(true))); |
| ServiceRefPtr configured_service; |
| EXPECT_CALL(*profile, LoadService(_)) |
| .WillOnce(Return(false)); |
| EXPECT_CALL(*profile, ConfigureService(_)) |
| .WillOnce(DoAll(SaveArg<0>(&configured_service), Return(true))); |
| ServiceRefPtr service = manager()->GetService(args, &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| EXPECT_TRUE(service); |
| EXPECT_EQ(service, updated_service); |
| EXPECT_EQ(service, configured_service); |
| |
| #endif // DISABLE_VPN |
| } |
| |
| TEST_F(ManagerTest, GetServiceWiMaxNoNetworkId) { |
| KeyValueStore args; |
| Error e; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWimax); |
| ServiceRefPtr service = manager()->GetService(args, &e); |
| EXPECT_EQ(Error::kInvalidArguments, e.type()); |
| EXPECT_EQ("Missing WiMAX network id.", e.message()); |
| EXPECT_FALSE(service); |
| } |
| |
| TEST_F(ManagerTest, GetServiceWiMax) { |
| KeyValueStore args; |
| Error e; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWimax); |
| args.SetString(WiMaxService::kNetworkIdProperty, "01234567"); |
| args.SetString(flimflam::kNameProperty, "WiMAX Network"); |
| ServiceRefPtr service = manager()->GetService(args, &e); |
| EXPECT_TRUE(e.IsSuccess()); |
| EXPECT_TRUE(service); |
| } |
| |
| TEST_F(ManagerTest, ConfigureServiceWithInvalidProfile) { |
| // Manager calls ActiveProfile() so we need at least one profile installed. |
| scoped_refptr<MockProfile> profile( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| AdoptProfile(manager(), profile); |
| |
| KeyValueStore args; |
| args.SetString(flimflam::kProfileProperty, "xxx"); |
| Error error; |
| manager()->ConfigureService(args, &error); |
| EXPECT_EQ(Error::kInvalidArguments, error.type()); |
| EXPECT_EQ("Invalid profile name xxx", error.message()); |
| } |
| |
| TEST_F(ManagerTest, ConfigureServiceWithGetServiceFailure) { |
| // Manager calls ActiveProfile() so we need at least one profile installed. |
| scoped_refptr<MockProfile> profile( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| AdoptProfile(manager(), profile); |
| |
| KeyValueStore args; |
| Error error; |
| manager()->ConfigureService(args, &error); |
| EXPECT_EQ(Error::kInvalidArguments, error.type()); |
| EXPECT_EQ("must specify service type", error.message()); |
| } |
| |
| // A registered service in the ephemeral profile should be moved to the |
| // active profile as a part of configuration if no profile was explicitly |
| // specified. |
| TEST_F(ManagerTest, ConfigureRegisteredServiceWithoutProfile) { |
| scoped_refptr<MockProfile> profile( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| |
| AdoptProfile(manager(), profile); // This is now the active profile. |
| |
| const vector<uint8_t> ssid; |
| scoped_refptr<MockWiFiService> service( |
| new NiceMock<MockWiFiService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| wifi_provider_, |
| ssid, |
| "", |
| "", |
| false)); |
| |
| manager()->RegisterService(service); |
| service->set_profile(GetEphemeralProfile(manager())); |
| |
| EXPECT_CALL(*wifi_provider_, GetService(_, _)) |
| .WillOnce(Return(service)); |
| EXPECT_CALL(*profile, UpdateService(ServiceRefPtr(service.get()))) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*profile, AdoptService(ServiceRefPtr(service.get()))) |
| .WillOnce(Return(true)); |
| |
| KeyValueStore args; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWifi); |
| Error error; |
| manager()->ConfigureService(args, &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| } |
| |
| // If we configure a service that was already registered and explicitly |
| // specify a profile, it should be moved from the profile it was previously |
| // in to the specified profile if one was requested. |
| TEST_F(ManagerTest, ConfigureRegisteredServiceWithProfile) { |
| scoped_refptr<MockProfile> profile0( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| scoped_refptr<MockProfile> profile1( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| |
| const string kProfileName0 = "profile0"; |
| const string kProfileName1 = "profile1"; |
| |
| EXPECT_CALL(*profile0, GetRpcIdentifier()) |
| .WillRepeatedly(Return(kProfileName0)); |
| EXPECT_CALL(*profile1, GetRpcIdentifier()) |
| .WillRepeatedly(Return(kProfileName1)); |
| |
| AdoptProfile(manager(), profile0); |
| AdoptProfile(manager(), profile1); // profile1 is now the ActiveProfile. |
| |
| const vector<uint8_t> ssid; |
| scoped_refptr<MockWiFiService> service( |
| new NiceMock<MockWiFiService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| wifi_provider_, |
| ssid, |
| "", |
| "", |
| false)); |
| |
| manager()->RegisterService(service); |
| service->set_profile(profile1); |
| |
| EXPECT_CALL(*wifi_provider_, GetService(_, _)) |
| .WillOnce(Return(service)); |
| EXPECT_CALL(*profile0, LoadService(ServiceRefPtr(service.get()))) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*profile0, UpdateService(ServiceRefPtr(service.get()))) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*profile0, AdoptService(ServiceRefPtr(service.get()))) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*profile1, AbandonService(ServiceRefPtr(service.get()))) |
| .WillOnce(Return(true)); |
| |
| KeyValueStore args; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWifi); |
| args.SetString(flimflam::kProfileProperty, kProfileName0); |
| Error error; |
| manager()->ConfigureService(args, &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| service->set_profile(NULL); // Breaks refcounting loop. |
| } |
| |
| // If we configure a service that is already a member of the specified |
| // profile, the Manager should not call LoadService or AdoptService again |
| // on this service. |
| TEST_F(ManagerTest, ConfigureRegisteredServiceWithSameProfile) { |
| scoped_refptr<MockProfile> profile0( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| |
| const string kProfileName0 = "profile0"; |
| |
| EXPECT_CALL(*profile0, GetRpcIdentifier()) |
| .WillRepeatedly(Return(kProfileName0)); |
| |
| AdoptProfile(manager(), profile0); // profile0 is now the ActiveProfile. |
| |
| const vector<uint8_t> ssid; |
| scoped_refptr<MockWiFiService> service( |
| new NiceMock<MockWiFiService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| wifi_provider_, |
| ssid, |
| "", |
| "", |
| false)); |
| |
| manager()->RegisterService(service); |
| service->set_profile(profile0); |
| |
| EXPECT_CALL(*wifi_provider_, GetService(_, _)) |
| .WillOnce(Return(service)); |
| EXPECT_CALL(*profile0, LoadService(ServiceRefPtr(service.get()))) |
| .Times(0); |
| EXPECT_CALL(*profile0, UpdateService(ServiceRefPtr(service.get()))) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*profile0, AdoptService(ServiceRefPtr(service.get()))) |
| .Times(0); |
| |
| KeyValueStore args; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWifi); |
| args.SetString(flimflam::kProfileProperty, kProfileName0); |
| Error error; |
| manager()->ConfigureService(args, &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| service->set_profile(NULL); // Breaks refcounting loop. |
| } |
| |
| // An unregistered service should remain unregistered, but its contents should |
| // be saved to the specified profile nonetheless. |
| TEST_F(ManagerTest, ConfigureUnregisteredServiceWithProfile) { |
| scoped_refptr<MockProfile> profile0( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| scoped_refptr<MockProfile> profile1( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| |
| const string kProfileName0 = "profile0"; |
| const string kProfileName1 = "profile1"; |
| |
| EXPECT_CALL(*profile0, GetRpcIdentifier()) |
| .WillRepeatedly(Return(kProfileName0)); |
| EXPECT_CALL(*profile1, GetRpcIdentifier()) |
| .WillRepeatedly(Return(kProfileName1)); |
| |
| AdoptProfile(manager(), profile0); |
| AdoptProfile(manager(), profile1); // profile1 is now the ActiveProfile. |
| |
| const vector<uint8_t> ssid; |
| scoped_refptr<MockWiFiService> service( |
| new NiceMock<MockWiFiService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| wifi_provider_, |
| ssid, |
| "", |
| "", |
| false)); |
| |
| service->set_profile(profile1); |
| |
| EXPECT_CALL(*wifi_provider_, GetService(_, _)) |
| .WillOnce(Return(service)); |
| EXPECT_CALL(*profile0, UpdateService(ServiceRefPtr(service.get()))) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*profile0, AdoptService(_)) |
| .Times(0); |
| EXPECT_CALL(*profile1, AdoptService(_)) |
| .Times(0); |
| |
| KeyValueStore args; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWifi); |
| args.SetString(flimflam::kProfileProperty, kProfileName0); |
| Error error; |
| manager()->ConfigureService(args, &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| } |
| |
| TEST_F(ManagerTest, ConfigureServiceForProfileWithNoType) { |
| KeyValueStore args; |
| Error error; |
| ServiceRefPtr service = |
| manager()->ConfigureServiceForProfile("", args, &error); |
| EXPECT_EQ(Error::kInvalidArguments, error.type()); |
| EXPECT_EQ("must specify service type", error.message()); |
| EXPECT_EQ(NULL, service.get()); |
| } |
| |
| TEST_F(ManagerTest, ConfigureServiceForProfileWithWrongType) { |
| KeyValueStore args; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeCellular); |
| Error error; |
| ServiceRefPtr service = |
| manager()->ConfigureServiceForProfile("", args, &error); |
| EXPECT_EQ(Error::kNotSupported, error.type()); |
| EXPECT_EQ("service type is unsupported", error.message()); |
| EXPECT_EQ(NULL, service.get()); |
| } |
| |
| TEST_F(ManagerTest, ConfigureServiceForProfileWithMissingProfile) { |
| KeyValueStore args; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWifi); |
| Error error; |
| ServiceRefPtr service = |
| manager()->ConfigureServiceForProfile("/profile/foo", args, &error); |
| EXPECT_EQ(Error::kNotFound, error.type()); |
| EXPECT_EQ("Profile specified was not found", error.message()); |
| EXPECT_EQ(NULL, service.get()); |
| } |
| |
| TEST_F(ManagerTest, ConfigureServiceForProfileWithProfileMismatch) { |
| const string kProfileName0 = "profile0"; |
| const string kProfileName1 = "profile1"; |
| scoped_refptr<MockProfile> profile0( |
| AddNamedMockProfileToManager(manager(), kProfileName0)); |
| |
| KeyValueStore args; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWifi); |
| args.SetString(flimflam::kProfileProperty, kProfileName1); |
| Error error; |
| ServiceRefPtr service = |
| manager()->ConfigureServiceForProfile(kProfileName0, args, &error); |
| EXPECT_EQ(Error::kInvalidArguments, error.type()); |
| EXPECT_EQ("Profile argument does not match that in " |
| "the configuration arguments", error.message()); |
| EXPECT_EQ(NULL, service.get()); |
| } |
| |
| TEST_F(ManagerTest, |
| ConfigureServiceForProfileWithNoMatchingServiceFailGetService) { |
| const string kProfileName0 = "profile0"; |
| scoped_refptr<MockProfile> profile0( |
| AddNamedMockProfileToManager(manager(), kProfileName0)); |
| KeyValueStore args; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWifi); |
| args.SetString(flimflam::kProfileProperty, kProfileName0); |
| |
| EXPECT_CALL(*wifi_provider_, FindSimilarService(_, _)) |
| .WillOnce(Return(WiFiServiceRefPtr())); |
| EXPECT_CALL(*wifi_provider_, GetService(_, _)) |
| .WillOnce(Return(WiFiServiceRefPtr())); |
| Error error; |
| ServiceRefPtr service = |
| manager()->ConfigureServiceForProfile(kProfileName0, args, &error); |
| // Since we didn't set the error in the GetService expectation above... |
| EXPECT_TRUE(error.IsSuccess()); |
| EXPECT_EQ(NULL, service.get()); |
| } |
| |
| TEST_F(ManagerTest, ConfigureServiceForProfileCreateNewService) { |
| const string kProfileName0 = "profile0"; |
| scoped_refptr<MockProfile> profile0( |
| AddNamedMockProfileToManager(manager(), kProfileName0)); |
| |
| KeyValueStore args; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWifi); |
| |
| scoped_refptr<MockWiFiService> mock_service( |
| new NiceMock<MockWiFiService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| wifi_provider_, |
| vector<uint8_t>(), |
| flimflam::kModeManaged, |
| flimflam::kSecurityNone, |
| false)); |
| ServiceRefPtr mock_service_generic(mock_service.get()); |
| mock_service->set_profile(profile0); |
| EXPECT_CALL(*wifi_provider_, FindSimilarService(_, _)) |
| .WillOnce(Return(WiFiServiceRefPtr())); |
| EXPECT_CALL(*wifi_provider_, GetService(_, _)).WillOnce(Return(mock_service)); |
| EXPECT_CALL(*profile0, UpdateService(mock_service_generic)) |
| .WillOnce(Return(true)); |
| Error error; |
| ServiceRefPtr service = |
| manager()->ConfigureServiceForProfile(kProfileName0, args, &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| EXPECT_EQ(mock_service.get(), service.get()); |
| mock_service->set_profile(NULL); // Breaks reference cycle. |
| } |
| |
| TEST_F(ManagerTest, ConfigureServiceForProfileMatchingServiceByGUID) { |
| scoped_refptr<MockService> mock_service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| const string kGUID = "a guid"; |
| mock_service->SetGuid(kGUID, NULL); |
| manager()->RegisterService(mock_service); |
| ServiceRefPtr mock_service_generic(mock_service.get()); |
| |
| const string kProfileName = "profile"; |
| scoped_refptr<MockProfile> profile( |
| AddNamedMockProfileToManager(manager(), kProfileName)); |
| mock_service->set_profile(profile); |
| |
| EXPECT_CALL(*mock_service, technology()) |
| .WillOnce(Return(Technology::kCellular)) |
| .WillOnce(Return(Technology::kWifi)); |
| |
| EXPECT_CALL(*wifi_provider_, FindSimilarService(_, _)).Times(0); |
| EXPECT_CALL(*wifi_provider_, GetService(_, _)).Times(0); |
| EXPECT_CALL(*profile, AdoptService(mock_service_generic)).Times(0); |
| |
| KeyValueStore args; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWifi); |
| args.SetString(flimflam::kGuidProperty, kGUID); |
| |
| // The first attempt should fail because the service reports a technology |
| // other than "WiFi". |
| { |
| Error error; |
| ServiceRefPtr service = |
| manager()->ConfigureServiceForProfile(kProfileName, args, &error); |
| EXPECT_EQ(NULL, service.get()); |
| EXPECT_EQ(Error::kNotSupported, error.type()); |
| EXPECT_EQ("This GUID matches a non-wifi service", error.message()); |
| } |
| |
| EXPECT_CALL(*mock_service, Configure(_, _)).Times(1); |
| EXPECT_CALL(*profile, UpdateService(mock_service_generic)).Times(1); |
| |
| { |
| Error error; |
| ServiceRefPtr service = |
| manager()->ConfigureServiceForProfile(kProfileName, args, &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| EXPECT_EQ(mock_service.get(), service.get()); |
| EXPECT_EQ(profile.get(), service->profile().get()); |
| } |
| mock_service->set_profile(NULL); // Breaks reference cycle. |
| } |
| |
| TEST_F(ManagerTest, ConfigureServiceForProfileMatchingServiceAndProfile) { |
| const string kProfileName = "profile"; |
| scoped_refptr<MockProfile> profile( |
| AddNamedMockProfileToManager(manager(), kProfileName)); |
| |
| scoped_refptr<MockWiFiService> mock_service( |
| new NiceMock<MockWiFiService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| wifi_provider_, |
| vector<uint8_t>(), |
| flimflam::kModeManaged, |
| flimflam::kSecurityNone, |
| false)); |
| mock_service->set_profile(profile); |
| ServiceRefPtr mock_service_generic(mock_service.get()); |
| |
| KeyValueStore args; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWifi); |
| EXPECT_CALL(*wifi_provider_, FindSimilarService(_, _)) |
| .WillOnce(Return(mock_service)); |
| EXPECT_CALL(*wifi_provider_, GetService(_, _)).Times(0); |
| EXPECT_CALL(*profile, AdoptService(mock_service_generic)).Times(0); |
| EXPECT_CALL(*mock_service, Configure(_, _)).Times(1); |
| EXPECT_CALL(*profile, UpdateService(mock_service_generic)).Times(1); |
| |
| Error error; |
| ServiceRefPtr service = |
| manager()->ConfigureServiceForProfile(kProfileName, args, &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| EXPECT_EQ(mock_service.get(), service.get()); |
| EXPECT_EQ(profile.get(), service->profile().get()); |
| mock_service->set_profile(NULL); // Breaks reference cycle. |
| } |
| |
| TEST_F(ManagerTest, ConfigureServiceForProfileMatchingServiceEphemeralProfile) { |
| const string kProfileName = "profile"; |
| scoped_refptr<MockProfile> profile( |
| AddNamedMockProfileToManager(manager(), kProfileName)); |
| |
| scoped_refptr<MockWiFiService> mock_service( |
| new NiceMock<MockWiFiService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| wifi_provider_, |
| vector<uint8_t>(), |
| flimflam::kModeManaged, |
| flimflam::kSecurityNone, |
| false)); |
| mock_service->set_profile(GetEphemeralProfile(manager())); |
| ServiceRefPtr mock_service_generic(mock_service.get()); |
| |
| KeyValueStore args; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWifi); |
| EXPECT_CALL(*wifi_provider_, FindSimilarService(_, _)) |
| .WillOnce(Return(mock_service)); |
| EXPECT_CALL(*wifi_provider_, GetService(_, _)).Times(0); |
| EXPECT_CALL(*mock_service, Configure(_, _)).Times(1); |
| EXPECT_CALL(*profile, UpdateService(mock_service_generic)).Times(1); |
| |
| Error error; |
| ServiceRefPtr service = |
| manager()->ConfigureServiceForProfile(kProfileName, args, &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| EXPECT_EQ(mock_service.get(), service.get()); |
| EXPECT_EQ(profile.get(), service->profile().get()); |
| mock_service->set_profile(NULL); // Breaks reference cycle. |
| } |
| |
| TEST_F(ManagerTest, ConfigureServiceForProfileMatchingServicePrecedingProfile) { |
| const string kProfileName0 = "profile0"; |
| scoped_refptr<MockProfile> profile0( |
| AddNamedMockProfileToManager(manager(), kProfileName0)); |
| const string kProfileName1 = "profile1"; |
| scoped_refptr<MockProfile> profile1( |
| AddNamedMockProfileToManager(manager(), kProfileName1)); |
| |
| scoped_refptr<MockWiFiService> mock_service( |
| new NiceMock<MockWiFiService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| wifi_provider_, |
| vector<uint8_t>(), |
| flimflam::kModeManaged, |
| flimflam::kSecurityNone, |
| false)); |
| manager()->RegisterService(mock_service); |
| mock_service->set_profile(profile0); |
| ServiceRefPtr mock_service_generic(mock_service.get()); |
| |
| KeyValueStore args; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWifi); |
| EXPECT_CALL(*wifi_provider_, FindSimilarService(_, _)) |
| .WillOnce(Return(mock_service)); |
| EXPECT_CALL(*wifi_provider_, GetService(_, _)).Times(0); |
| EXPECT_CALL(*profile0, AbandonService(_)).Times(0); |
| EXPECT_CALL(*profile1, AdoptService(_)).Times(0); |
| // This happens once to make the service loadable for the ConfigureService |
| // below, and a second time after the service is modified. |
| EXPECT_CALL(*profile1, ConfigureService(mock_service_generic)).Times(0); |
| EXPECT_CALL(*wifi_provider_, CreateTemporaryService(_, _)).Times(0); |
| EXPECT_CALL(*mock_service, Configure(_, _)).Times(1); |
| EXPECT_CALL(*profile1, UpdateService(mock_service_generic)).Times(1); |
| |
| Error error; |
| ServiceRefPtr service = |
| manager()->ConfigureServiceForProfile(kProfileName1, args, &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| EXPECT_EQ(mock_service.get(), service.get()); |
| mock_service->set_profile(NULL); // Breaks reference cycle. |
| } |
| |
| TEST_F(ManagerTest, |
| ConfigureServiceForProfileMatchingServiceProceedingProfile) { |
| const string kProfileName0 = "profile0"; |
| scoped_refptr<MockProfile> profile0( |
| AddNamedMockProfileToManager(manager(), kProfileName0)); |
| const string kProfileName1 = "profile1"; |
| scoped_refptr<MockProfile> profile1( |
| AddNamedMockProfileToManager(manager(), kProfileName1)); |
| |
| scoped_refptr<MockWiFiService> matching_service( |
| new StrictMock<MockWiFiService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| wifi_provider_, |
| vector<uint8_t>(), |
| flimflam::kModeManaged, |
| flimflam::kSecurityNone, |
| false)); |
| matching_service->set_profile(profile1); |
| |
| // We need to get rid of our reference to this mock service as soon |
| // as Manager::ConfigureServiceForProfile() takes a reference in its |
| // call to WiFiProvider::CreateTemporaryService(). This way the |
| // latter function can keep a DCHECK(service->HasOneRef() even in |
| // unit tests. |
| temp_mock_service_ = |
| new NiceMock<MockWiFiService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| wifi_provider_, |
| vector<uint8_t>(), |
| flimflam::kModeManaged, |
| flimflam::kSecurityNone, |
| false); |
| |
| // Only hold a pointer here so we don't affect the refcount. |
| MockWiFiService *mock_service_ptr = temp_mock_service_.get(); |
| |
| KeyValueStore args; |
| args.SetString(flimflam::kTypeProperty, flimflam::kTypeWifi); |
| EXPECT_CALL(*wifi_provider_, FindSimilarService(_, _)) |
| .WillOnce(Return(matching_service)); |
| EXPECT_CALL(*wifi_provider_, GetService(_, _)).Times(0); |
| EXPECT_CALL(*profile1, AbandonService(_)).Times(0); |
| EXPECT_CALL(*profile0, AdoptService(_)).Times(0); |
| EXPECT_CALL(*wifi_provider_, CreateTemporaryService(_, _)) |
| .WillOnce(InvokeWithoutArgs(this, &ManagerTest::ReleaseTempMockService)); |
| EXPECT_CALL(*profile0, ConfigureService(IsRefPtrTo(mock_service_ptr))) |
| .Times(1); |
| EXPECT_CALL(*mock_service_ptr, Configure(_, _)).Times(1); |
| EXPECT_CALL(*profile0, UpdateService(IsRefPtrTo(mock_service_ptr))).Times(1); |
| |
| Error error; |
| ServiceRefPtr service = |
| manager()->ConfigureServiceForProfile(kProfileName0, args, &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| EXPECT_EQ(NULL, service.get()); |
| EXPECT_EQ(profile1.get(), matching_service->profile().get()); |
| } |
| |
| TEST_F(ManagerTest, FindMatchingService) { |
| KeyValueStore args; |
| { |
| Error error; |
| ServiceRefPtr service = manager()->FindMatchingService(args, &error); |
| EXPECT_EQ(Error::kNotFound, error.type()); |
| } |
| |
| scoped_refptr<MockService> mock_service0( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| scoped_refptr<MockService> mock_service1( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| manager()->RegisterService(mock_service0); |
| manager()->RegisterService(mock_service1); |
| EXPECT_CALL(*mock_service0, DoPropertiesMatch(_)) |
| .WillOnce(Return(true)) |
| .WillRepeatedly(Return(false)); |
| { |
| Error error; |
| EXPECT_EQ(mock_service0, manager()->FindMatchingService(args, &error)); |
| EXPECT_TRUE(error.IsSuccess()); |
| } |
| EXPECT_CALL(*mock_service1, DoPropertiesMatch(_)) |
| .WillOnce(Return(true)) |
| .WillRepeatedly(Return(false)); |
| { |
| Error error; |
| EXPECT_EQ(mock_service1, manager()->FindMatchingService(args, &error)); |
| EXPECT_TRUE(error.IsSuccess()); |
| } |
| { |
| Error error; |
| EXPECT_FALSE(manager()->FindMatchingService(args, &error)); |
| EXPECT_EQ(Error::kNotFound, error.type()); |
| } |
| } |
| |
| TEST_F(ManagerTest, TechnologyOrder) { |
| Error error; |
| manager()->SetTechnologyOrder(string(flimflam::kTypeEthernet) + "," + |
| string(flimflam::kTypeWifi), &error); |
| ASSERT_TRUE(error.IsSuccess()); |
| EXPECT_EQ(manager()->GetTechnologyOrder(), |
| string(flimflam::kTypeEthernet) + "," + |
| string(flimflam::kTypeWifi)); |
| |
| manager()->SetTechnologyOrder(string(flimflam::kTypeEthernet) + "x," + |
| string(flimflam::kTypeWifi), &error); |
| ASSERT_FALSE(error.IsSuccess()); |
| EXPECT_EQ(Error::kInvalidArguments, error.type()); |
| EXPECT_EQ(string(flimflam::kTypeEthernet) + "," + |
| string(flimflam::kTypeWifi), |
| manager()->GetTechnologyOrder()); |
| } |
| |
| TEST_F(ManagerTest, SortServices) { |
| // TODO(quiche): Some of these tests would probably fit better in |
| // service_unittest, since the actual comparison of Services is |
| // implemented in Service. (crbug.com/206367) |
| |
| scoped_refptr<MockService> mock_service0( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| scoped_refptr<MockService> mock_service1( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| manager()->RegisterService(mock_service0); |
| manager()->RegisterService(mock_service1); |
| |
| // Services should already be sorted by |unique_name_| |
| EXPECT_TRUE(ServiceOrderIs(mock_service0, mock_service1)); |
| |
| // Asking explictly to sort services should not change anything |
| manager()->SortServicesTask(); |
| EXPECT_TRUE(ServiceOrderIs(mock_service0, mock_service1)); |
| |
| // Two otherwise equal services should be reordered by strength |
| mock_service1->SetStrength(1); |
| manager()->UpdateService(mock_service1); |
| EXPECT_TRUE(ServiceOrderIs(mock_service1, mock_service0)); |
| |
| // Security |
| mock_service0->SetSecurity(Service::kCryptoAes, true, true); |
| manager()->UpdateService(mock_service0); |
| EXPECT_TRUE(ServiceOrderIs(mock_service0, mock_service1)); |
| |
| // Technology |
| EXPECT_CALL(*mock_service0.get(), technology()) |
| .WillRepeatedly(Return((Technology::kWifi))); |
| EXPECT_CALL(*mock_service1.get(), technology()) |
| .WillRepeatedly(Return(Technology::kEthernet)); |
| |
| Error error; |
| // Default technology ordering should favor Ethernet over WiFi. |
| manager()->SortServicesTask(); |
| EXPECT_TRUE(ServiceOrderIs(mock_service1, mock_service0)); |
| |
| manager()->SetTechnologyOrder(string(flimflam::kTypeWifi) + "," + |
| string(flimflam::kTypeEthernet), &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| EXPECT_TRUE(ServiceOrderIs(mock_service0, mock_service1)); |
| |
| // Priority. |
| mock_service0->SetPriority(1, NULL); |
| manager()->UpdateService(mock_service0); |
| EXPECT_TRUE(ServiceOrderIs(mock_service0, mock_service1)); |
| |
| // Favorite. |
| mock_service1->MakeFavorite(); |
| manager()->UpdateService(mock_service1); |
| EXPECT_TRUE(ServiceOrderIs(mock_service1, mock_service0)); |
| |
| // Auto-connect. |
| mock_service0->SetAutoConnect(true); |
| manager()->UpdateService(mock_service0); |
| mock_service1->SetAutoConnect(false); |
| manager()->UpdateService(mock_service1); |
| EXPECT_TRUE(ServiceOrderIs(mock_service0, mock_service1)); |
| |
| // Test is-dependent-on. It doesn't make sense to have this ranking compare |
| // to any of the others below, so we reset to the default state after |
| // testing. |
| EXPECT_CALL(*mock_service1.get(), |
| IsDependentOn(ServiceRefPtr(mock_service0.get()))) |
| .WillOnce(Return(true)) |
| .WillRepeatedly(Return(false)); |
| manager()->UpdateService(mock_service1); |
| EXPECT_TRUE(ServiceOrderIs(mock_service1, mock_service0)); |
| manager()->UpdateService(mock_service0); |
| EXPECT_TRUE(ServiceOrderIs(mock_service0, mock_service1)); |
| |
| // Connectable. |
| mock_service1->SetConnectable(true); |
| manager()->UpdateService(mock_service1); |
| mock_service0->SetConnectable(false); |
| manager()->UpdateService(mock_service0); |
| EXPECT_TRUE(ServiceOrderIs(mock_service1, mock_service0)); |
| |
| // IsFailed. |
| EXPECT_CALL(*mock_service0.get(), state()) |
| .WillRepeatedly(Return(Service::kStateIdle)); |
| EXPECT_CALL(*mock_service0.get(), IsFailed()) |
| .WillRepeatedly(Return(false)); |
| manager()->UpdateService(mock_service0); |
| EXPECT_CALL(*mock_service0.get(), state()) |
| .WillRepeatedly(Return(Service::kStateFailure)); |
| EXPECT_CALL(*mock_service1.get(), IsFailed()) |
| .WillRepeatedly(Return(true)); |
| manager()->UpdateService(mock_service1); |
| EXPECT_TRUE(ServiceOrderIs(mock_service0, mock_service1)); |
| |
| // Connecting. |
| EXPECT_CALL(*mock_service1.get(), state()) |
| .WillRepeatedly(Return(Service::kStateAssociating)); |
| EXPECT_CALL(*mock_service1.get(), IsConnecting()) |
| .WillRepeatedly(Return(true)); |
| manager()->UpdateService(mock_service1); |
| EXPECT_TRUE(ServiceOrderIs(mock_service1, mock_service0)); |
| |
| // Connected. |
| EXPECT_CALL(*mock_service0.get(), state()) |
| .WillRepeatedly(Return(Service::kStatePortal)); |
| EXPECT_CALL(*mock_service0.get(), IsConnected()) |
| .WillRepeatedly(Return(true)); |
| manager()->UpdateService(mock_service0); |
| EXPECT_TRUE(ServiceOrderIs(mock_service0, mock_service1)); |
| |
| // Portal. |
| EXPECT_CALL(*mock_service1.get(), state()) |
| .WillRepeatedly(Return(Service::kStateConnected)); |
| EXPECT_CALL(*mock_service1.get(), IsConnected()) |
| .WillRepeatedly(Return(true)); |
| manager()->UpdateService(mock_service1); |
| EXPECT_TRUE(ServiceOrderIs(mock_service1, mock_service0)); |
| |
| manager()->DeregisterService(mock_service0); |
| manager()->DeregisterService(mock_service1); |
| } |
| |
| TEST_F(ManagerTest, SortServicesWithConnection) { |
| MockMetrics mock_metrics(dispatcher()); |
| SetMetrics(&mock_metrics); |
| |
| scoped_refptr<MockService> mock_service0( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| scoped_refptr<MockService> mock_service1( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| scoped_refptr<MockConnection> mock_connection0( |
| new NiceMock<MockConnection>(device_info_.get())); |
| scoped_refptr<MockConnection> mock_connection1( |
| new NiceMock<MockConnection>(device_info_.get())); |
| |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(NULL)); |
| manager()->RegisterService(mock_service0); |
| CompleteServiceSort(); |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(NULL)); |
| manager()->RegisterService(mock_service1); |
| CompleteServiceSort(); |
| |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(NULL)); |
| manager()->SortServicesTask(); |
| |
| mock_service1->SetPriority(1, NULL); |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(NULL)); |
| manager()->SortServicesTask(); |
| |
| mock_service1->SetPriority(0, NULL); |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(NULL)); |
| manager()->SortServicesTask(); |
| |
| mock_service0->set_mock_connection(mock_connection0); |
| mock_service1->set_mock_connection(mock_connection1); |
| |
| EXPECT_CALL(*mock_connection0.get(), SetIsDefault(true)); |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(mock_service0.get())); |
| manager()->SortServicesTask(); |
| |
| ServiceWatcher service_watcher; |
| int tag = |
| manager()->RegisterDefaultServiceCallback( |
| Bind(&ServiceWatcher::OnDefaultServiceChanged, |
| service_watcher.AsWeakPtr())); |
| EXPECT_EQ(1, tag); |
| |
| mock_service1->SetPriority(1, NULL); |
| EXPECT_CALL(*mock_connection0.get(), SetIsDefault(false)); |
| EXPECT_CALL(*mock_connection1.get(), SetIsDefault(true)); |
| EXPECT_CALL(service_watcher, OnDefaultServiceChanged(_)); |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(mock_service1.get())); |
| manager()->SortServicesTask(); |
| |
| manager()->DeregisterDefaultServiceCallback(tag); |
| EXPECT_CALL(*mock_connection0.get(), SetIsDefault(true)); |
| EXPECT_CALL(service_watcher, OnDefaultServiceChanged(_)).Times(0); |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(mock_service0.get())); |
| mock_service1->set_mock_connection(NULL); |
| manager()->DeregisterService(mock_service1); |
| CompleteServiceSort(); |
| |
| mock_service0->set_mock_connection(NULL); |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(NULL)); |
| manager()->DeregisterService(mock_service0); |
| CompleteServiceSort(); |
| |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(NULL)); |
| manager()->SortServicesTask(); |
| } |
| |
| TEST_F(ManagerTest, NotifyDefaultServiceChanged) { |
| EXPECT_EQ(0, manager()->default_service_callback_tag_); |
| EXPECT_TRUE(manager()->default_service_callbacks_.empty()); |
| |
| MockMetrics mock_metrics(dispatcher()); |
| SetMetrics(&mock_metrics); |
| |
| scoped_refptr<MockService> mock_service( |
| new NiceMock<MockService>( |
| control_interface(), dispatcher(), metrics(), manager())); |
| ServiceRefPtr service = mock_service; |
| ServiceRefPtr null_service; |
| |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(NULL)); |
| manager()->NotifyDefaultServiceChanged(null_service); |
| |
| ServiceWatcher service_watcher1; |
| ServiceWatcher service_watcher2; |
| int tag1 = |
| manager()->RegisterDefaultServiceCallback( |
| Bind(&ServiceWatcher::OnDefaultServiceChanged, |
| service_watcher1.AsWeakPtr())); |
| EXPECT_EQ(1, tag1); |
| int tag2 = |
| manager()->RegisterDefaultServiceCallback( |
| Bind(&ServiceWatcher::OnDefaultServiceChanged, |
| service_watcher2.AsWeakPtr())); |
| EXPECT_EQ(2, tag2); |
| |
| EXPECT_CALL(service_watcher1, OnDefaultServiceChanged(null_service)); |
| EXPECT_CALL(service_watcher2, OnDefaultServiceChanged(null_service)); |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(NULL)); |
| manager()->NotifyDefaultServiceChanged(null_service); |
| |
| EXPECT_CALL(service_watcher1, OnDefaultServiceChanged(service)); |
| EXPECT_CALL(service_watcher2, OnDefaultServiceChanged(service)); |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(service.get())); |
| manager()->NotifyDefaultServiceChanged(mock_service); |
| |
| manager()->DeregisterDefaultServiceCallback(tag1); |
| EXPECT_CALL(service_watcher1, OnDefaultServiceChanged(_)).Times(0); |
| EXPECT_CALL(service_watcher2, OnDefaultServiceChanged(service)); |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(service.get())); |
| manager()->NotifyDefaultServiceChanged(mock_service); |
| EXPECT_EQ(1, manager()->default_service_callbacks_.size()); |
| |
| manager()->DeregisterDefaultServiceCallback(tag2); |
| EXPECT_CALL(service_watcher2, OnDefaultServiceChanged(_)).Times(0); |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(service.get())); |
| manager()->NotifyDefaultServiceChanged(mock_service); |
| |
| EXPECT_EQ(2, manager()->default_service_callback_tag_); |
| EXPECT_TRUE(manager()->default_service_callbacks_.empty()); |
| } |
| |
| TEST_F(ManagerTest, AvailableTechnologies) { |
| mock_devices_.push_back(new NiceMock<MockDevice>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| "null4", |
| "addr4", |
| 0)); |
| manager()->RegisterDevice(mock_devices_[0]); |
| manager()->RegisterDevice(mock_devices_[1]); |
| manager()->RegisterDevice(mock_devices_[2]); |
| manager()->RegisterDevice(mock_devices_[3]); |
| |
| ON_CALL(*mock_devices_[0].get(), technology()) |
| .WillByDefault(Return(Technology::kEthernet)); |
| ON_CALL(*mock_devices_[1].get(), technology()) |
| .WillByDefault(Return(Technology::kWifi)); |
| ON_CALL(*mock_devices_[2].get(), technology()) |
| .WillByDefault(Return(Technology::kCellular)); |
| ON_CALL(*mock_devices_[3].get(), technology()) |
| .WillByDefault(Return(Technology::kWifi)); |
| |
| set<string> expected_technologies; |
| expected_technologies.insert(Technology::NameFromIdentifier( |
| Technology::kEthernet)); |
| expected_technologies.insert(Technology::NameFromIdentifier( |
| Technology::kWifi)); |
| expected_technologies.insert(Technology::NameFromIdentifier( |
| Technology::kCellular)); |
| Error error; |
| vector<string> technologies = manager()->AvailableTechnologies(&error); |
| |
| EXPECT_THAT(set<string>(technologies.begin(), technologies.end()), |
| ContainerEq(expected_technologies)); |
| } |
| |
| TEST_F(ManagerTest, ConnectedTechnologies) { |
| scoped_refptr<MockService> connected_service1( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| scoped_refptr<MockService> connected_service2( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| scoped_refptr<MockService> disconnected_service1( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| scoped_refptr<MockService> disconnected_service2( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| ON_CALL(*connected_service1.get(), IsConnected()) |
| .WillByDefault(Return(true)); |
| ON_CALL(*connected_service2.get(), IsConnected()) |
| .WillByDefault(Return(true)); |
| |
| manager()->RegisterService(connected_service1); |
| manager()->RegisterService(connected_service2); |
| manager()->RegisterService(disconnected_service1); |
| manager()->RegisterService(disconnected_service2); |
| |
| manager()->RegisterDevice(mock_devices_[0]); |
| manager()->RegisterDevice(mock_devices_[1]); |
| manager()->RegisterDevice(mock_devices_[2]); |
| manager()->RegisterDevice(mock_devices_[3]); |
| |
| ON_CALL(*mock_devices_[0].get(), technology()) |
| .WillByDefault(Return(Technology::kEthernet)); |
| ON_CALL(*mock_devices_[1].get(), technology()) |
| .WillByDefault(Return(Technology::kWifi)); |
| ON_CALL(*mock_devices_[2].get(), technology()) |
| .WillByDefault(Return(Technology::kCellular)); |
| ON_CALL(*mock_devices_[3].get(), technology()) |
| .WillByDefault(Return(Technology::kWifi)); |
| |
| mock_devices_[0]->SelectService(connected_service1); |
| mock_devices_[1]->SelectService(disconnected_service1); |
| mock_devices_[2]->SelectService(disconnected_service2); |
| mock_devices_[3]->SelectService(connected_service2); |
| |
| set<string> expected_technologies; |
| expected_technologies.insert(Technology::NameFromIdentifier( |
| Technology::kEthernet)); |
| expected_technologies.insert(Technology::NameFromIdentifier( |
| Technology::kWifi)); |
| Error error; |
| |
| vector<string> technologies = manager()->ConnectedTechnologies(&error); |
| EXPECT_THAT(set<string>(technologies.begin(), technologies.end()), |
| ContainerEq(expected_technologies)); |
| } |
| |
| TEST_F(ManagerTest, DefaultTechnology) { |
| scoped_refptr<MockService> connected_service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| scoped_refptr<MockService> disconnected_service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| // Connected. WiFi. |
| ON_CALL(*connected_service.get(), IsConnected()) |
| .WillByDefault(Return(true)); |
| ON_CALL(*connected_service.get(), state()) |
| .WillByDefault(Return(Service::kStateConnected)); |
| ON_CALL(*connected_service.get(), technology()) |
| .WillByDefault(Return(Technology::kWifi)); |
| |
| // Disconnected. Ethernet. |
| ON_CALL(*disconnected_service.get(), technology()) |
| .WillByDefault(Return(Technology::kEthernet)); |
| |
| manager()->RegisterService(disconnected_service); |
| CompleteServiceSort(); |
| Error error; |
| EXPECT_THAT(manager()->DefaultTechnology(&error), StrEq("")); |
| |
| |
| manager()->RegisterService(connected_service); |
| CompleteServiceSort(); |
| // Connected service should be brought to the front now. |
| string expected_technology = |
| Technology::NameFromIdentifier(Technology::kWifi); |
| EXPECT_THAT(manager()->DefaultTechnology(&error), StrEq(expected_technology)); |
| } |
| |
| TEST_F(ManagerTest, Stop) { |
| scoped_refptr<MockProfile> profile( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| AdoptProfile(manager(), profile); |
| scoped_refptr<MockService> service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| manager()->RegisterService(service); |
| manager()->RegisterDevice(mock_devices_[0]); |
| EXPECT_CALL(*profile.get(), |
| UpdateDevice(DeviceRefPtr(mock_devices_[0].get()))) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*profile.get(), UpdateWiFiProvider(_)).WillOnce(Return(true)); |
| EXPECT_CALL(*profile.get(), Save()).WillOnce(Return(true)); |
| EXPECT_CALL(*service.get(), Disconnect(_)).Times(1); |
| manager()->Stop(); |
| } |
| |
| TEST_F(ManagerTest, UpdateServiceConnected) { |
| scoped_refptr<MockService> mock_service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| manager()->RegisterService(mock_service); |
| EXPECT_FALSE(mock_service->favorite()); |
| EXPECT_FALSE(mock_service->auto_connect()); |
| |
| EXPECT_CALL(*mock_service.get(), IsConnected()) |
| .WillRepeatedly(Return(true)); |
| manager()->UpdateService(mock_service); |
| // We can't EXPECT_CALL(..., MakeFavorite), because that requires us |
| // to mock out MakeFavorite. And mocking that out would break the |
| // SortServices test. (crbug.com/206367) |
| EXPECT_TRUE(mock_service->favorite()); |
| EXPECT_TRUE(mock_service->auto_connect()); |
| } |
| |
| TEST_F(ManagerTest, UpdateServiceConnectedPersistFavorite) { |
| // This tests the case where the user connects to a service that is |
| // currently associated with a profile. We want to make sure that the |
| // favorite flag is set and that the flag is saved to the current |
| // profile. |
| scoped_refptr<MockService> mock_service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| manager()->RegisterService(mock_service); |
| EXPECT_FALSE(mock_service->favorite()); |
| EXPECT_FALSE(mock_service->auto_connect()); |
| |
| scoped_refptr<MockProfile> profile( |
| new MockProfile( |
| control_interface(), metrics(), manager(), "")); |
| |
| mock_service->set_profile(profile); |
| EXPECT_CALL(*mock_service, IsConnected()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*profile, |
| UpdateService(static_cast<ServiceRefPtr>(mock_service))); |
| manager()->UpdateService(mock_service); |
| // We can't EXPECT_CALL(..., MakeFavorite), because that requires us |
| // to mock out MakeFavorite. And mocking that out would break the |
| // SortServices test. (crbug.com/206367) |
| EXPECT_TRUE(mock_service->favorite()); |
| EXPECT_TRUE(mock_service->auto_connect()); |
| // This releases the ref on the mock profile. |
| mock_service->set_profile(NULL); |
| } |
| |
| TEST_F(ManagerTest, SaveSuccessfulService) { |
| scoped_refptr<MockProfile> profile( |
| new StrictMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| AdoptProfile(manager(), profile); |
| scoped_refptr<MockService> service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| // Re-cast this back to a ServiceRefPtr, so EXPECT arguments work correctly. |
| ServiceRefPtr expect_service(service.get()); |
| |
| EXPECT_CALL(*profile.get(), ConfigureService(expect_service)) |
| .WillOnce(Return(false)); |
| manager()->RegisterService(service); |
| |
| EXPECT_CALL(*service.get(), state()) |
| .WillRepeatedly(Return(Service::kStateConnected)); |
| EXPECT_CALL(*service.get(), IsConnected()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*profile.get(), AdoptService(expect_service)) |
| .WillOnce(Return(true)); |
| manager()->UpdateService(service); |
| } |
| |
| TEST_F(ManagerTest, UpdateDevice) { |
| MockProfile *profile0 = |
| new MockProfile(control_interface(), metrics(), manager(), ""); |
| MockProfile *profile1 = |
| new MockProfile(control_interface(), metrics(), manager(), ""); |
| MockProfile *profile2 = |
| new MockProfile(control_interface(), metrics(), manager(), ""); |
| AdoptProfile(manager(), profile0); // Passes ownership. |
| AdoptProfile(manager(), profile1); // Passes ownership. |
| AdoptProfile(manager(), profile2); // Passes ownership. |
| DeviceRefPtr device_ref(mock_devices_[0].get()); |
| EXPECT_CALL(*profile0, UpdateDevice(device_ref)).Times(0); |
| EXPECT_CALL(*profile1, UpdateDevice(device_ref)).WillOnce(Return(true)); |
| EXPECT_CALL(*profile2, UpdateDevice(device_ref)).WillOnce(Return(false)); |
| manager()->UpdateDevice(mock_devices_[0]); |
| } |
| |
| TEST_F(ManagerTest, EnumerateProfiles) { |
| vector<string> profile_paths; |
| for (size_t i = 0; i < 10; i++) { |
| scoped_refptr<MockProfile> profile( |
| new StrictMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| profile_paths.push_back(base::StringPrintf("/profile/%zd", i)); |
| EXPECT_CALL(*profile.get(), GetRpcIdentifier()) |
| .WillOnce(Return(profile_paths.back())); |
| AdoptProfile(manager(), profile); |
| } |
| |
| Error error; |
| vector<string> returned_paths = manager()->EnumerateProfiles(&error); |
| EXPECT_TRUE(error.IsSuccess()); |
| EXPECT_EQ(profile_paths.size(), returned_paths.size()); |
| for (size_t i = 0; i < profile_paths.size(); i++) { |
| EXPECT_EQ(profile_paths[i], returned_paths[i]); |
| } |
| } |
| |
| TEST_F(ManagerTest, AutoConnectOnRegister) { |
| MockServiceRefPtr service = MakeAutoConnectableService(); |
| EXPECT_CALL(*service.get(), AutoConnect()); |
| manager()->RegisterService(service); |
| dispatcher()->DispatchPendingEvents(); |
| } |
| |
| TEST_F(ManagerTest, AutoConnectOnUpdate) { |
| MockServiceRefPtr service1 = MakeAutoConnectableService(); |
| service1->SetPriority(1, NULL); |
| MockServiceRefPtr service2 = MakeAutoConnectableService(); |
| service2->SetPriority(2, NULL); |
| manager()->RegisterService(service1); |
| manager()->RegisterService(service2); |
| dispatcher()->DispatchPendingEvents(); |
| |
| EXPECT_CALL(*service1.get(), AutoConnect()); |
| EXPECT_CALL(*service2.get(), state()) |
| .WillRepeatedly(Return(Service::kStateFailure)); |
| EXPECT_CALL(*service2.get(), IsFailed()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*service2.get(), IsConnected()) |
| .WillRepeatedly(Return(false)); |
| manager()->UpdateService(service2); |
| dispatcher()->DispatchPendingEvents(); |
| } |
| |
| TEST_F(ManagerTest, AutoConnectOnDeregister) { |
| MockServiceRefPtr service1 = MakeAutoConnectableService(); |
| service1->SetPriority(1, NULL); |
| MockServiceRefPtr service2 = MakeAutoConnectableService(); |
| service2->SetPriority(2, NULL); |
| manager()->RegisterService(service1); |
| manager()->RegisterService(service2); |
| dispatcher()->DispatchPendingEvents(); |
| |
| EXPECT_CALL(*service1.get(), AutoConnect()); |
| manager()->DeregisterService(service2); |
| dispatcher()->DispatchPendingEvents(); |
| } |
| |
| TEST_F(ManagerTest, AutoConnectOnPowerStateSuspending) { |
| MockServiceRefPtr service = MakeAutoConnectableService(); |
| SetPowerState(PowerManagerProxyDelegate::kSuspending); |
| SetPowerManager(); |
| EXPECT_CALL(*service, AutoConnect()).Times(0); |
| manager()->RegisterService(service); |
| dispatcher()->DispatchPendingEvents(); |
| } |
| |
| TEST_F(ManagerTest, AutoConnectOnPowerStateMem) { |
| MockServiceRefPtr service = MakeAutoConnectableService(); |
| SetPowerState(PowerManagerProxyDelegate::kMem); |
| SetPowerManager(); |
| EXPECT_CALL(*service, AutoConnect()).Times(0); |
| manager()->RegisterService(service); |
| dispatcher()->DispatchPendingEvents(); |
| } |
| |
| TEST_F(ManagerTest, AutoConnectOnPowerStateOn) { |
| MockServiceRefPtr service = MakeAutoConnectableService(); |
| SetPowerState(PowerManagerProxyDelegate::kOn); |
| SetPowerManager(); |
| EXPECT_CALL(*service, AutoConnect()); |
| manager()->RegisterService(service); |
| dispatcher()->DispatchPendingEvents(); |
| } |
| |
| TEST_F(ManagerTest, AutoConnectOnPowerStateUnknown) { |
| MockServiceRefPtr service = MakeAutoConnectableService(); |
| SetPowerState(PowerManagerProxyDelegate::kUnknown); |
| SetPowerManager(); |
| EXPECT_CALL(*service, AutoConnect()); |
| manager()->RegisterService(service); |
| dispatcher()->DispatchPendingEvents(); |
| } |
| |
| TEST_F(ManagerTest, AutoConnectWhileNotRunning) { |
| SetRunning(false); |
| MockServiceRefPtr service = MakeAutoConnectableService(); |
| EXPECT_CALL(*service, AutoConnect()).Times(0); |
| manager()->RegisterService(service); |
| dispatcher()->DispatchPendingEvents(); |
| } |
| |
| TEST_F(ManagerTest, OnPowerStateChanged) { |
| MockServiceRefPtr service = MakeAutoConnectableService(); |
| SetPowerState(PowerManagerProxyDelegate::kOn); |
| SetPowerManager(); |
| EXPECT_CALL(*service, AutoConnect()); |
| manager()->RegisterService(service); |
| manager()->RegisterDevice(mock_devices_[0]); |
| dispatcher()->DispatchPendingEvents(); |
| |
| EXPECT_CALL(*mock_devices_[0], OnAfterResume()); |
| OnPowerStateChanged(PowerManagerProxyDelegate::kOn); |
| EXPECT_CALL(*service, AutoConnect()); |
| dispatcher()->DispatchPendingEvents(); |
| Mock::VerifyAndClearExpectations(mock_devices_[0]); |
| |
| EXPECT_CALL(*mock_devices_[0], OnBeforeSuspend()); |
| OnPowerStateChanged(PowerManagerProxyDelegate::kMem); |
| EXPECT_CALL(*service, AutoConnect()).Times(0); |
| dispatcher()->DispatchPendingEvents(); |
| Mock::VerifyAndClearExpectations(mock_devices_[0]); |
| } |
| |
| TEST_F(ManagerTest, AddTerminationAction) { |
| EXPECT_CALL(*power_manager_, AddSuspendDelayCallback(_, _)); |
| EXPECT_CALL(*power_manager_, RegisterSuspendDelay(_, _, _)); |
| SetPowerManager(); |
| EXPECT_TRUE(GetTerminationActions()->IsEmpty()); |
| manager()->AddTerminationAction("action1", base::Closure()); |
| EXPECT_FALSE(GetTerminationActions()->IsEmpty()); |
| manager()->AddTerminationAction("action2", base::Closure()); |
| } |
| |
| TEST_F(ManagerTest, RemoveTerminationAction) { |
| const char kKey1[] = "action1"; |
| const char kKey2[] = "action2"; |
| const int kSuspendDelayId = 123; |
| |
| MockPowerManager &power_manager = *power_manager_; |
| SetPowerManager(); |
| |
| // Removing an action when the hook table is empty should not result in any |
| // calls to the power manager. |
| EXPECT_CALL(power_manager, UnregisterSuspendDelay(_)).Times(0); |
| EXPECT_CALL(power_manager, RemoveSuspendDelayCallback(_)).Times(0); |
| EXPECT_TRUE(GetTerminationActions()->IsEmpty()); |
| manager()->RemoveTerminationAction("unknown"); |
| Mock::VerifyAndClearExpectations(&power_manager); |
| |
| EXPECT_CALL(power_manager, RegisterSuspendDelay(_, _, _)) |
| .WillOnce(DoAll(SetArgumentPointee<2>(kSuspendDelayId), Return(true))); |
| EXPECT_CALL(power_manager, AddSuspendDelayCallback(_, _)).Times(1); |
| manager()->AddTerminationAction(kKey1, base::Closure()); |
| EXPECT_FALSE(GetTerminationActions()->IsEmpty()); |
| manager()->AddTerminationAction(kKey2, base::Closure()); |
| |
| // Removing an action that ends up with a non-empty hook table should not |
| // result in any calls to the power manager. |
| EXPECT_CALL(power_manager, UnregisterSuspendDelay(_)).Times(0); |
| EXPECT_CALL(power_manager, RemoveSuspendDelayCallback(_)).Times(0); |
| manager()->RemoveTerminationAction(kKey1); |
| EXPECT_FALSE(GetTerminationActions()->IsEmpty()); |
| Mock::VerifyAndClearExpectations(&power_manager); |
| |
| // Removing the last action should trigger unregistering from the power |
| // manager. |
| EXPECT_CALL(power_manager, UnregisterSuspendDelay(kSuspendDelayId)) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(power_manager, RemoveSuspendDelayCallback(_)); |
| manager()->RemoveTerminationAction(kKey2); |
| EXPECT_TRUE(GetTerminationActions()->IsEmpty()); |
| } |
| |
| TEST_F(ManagerTest, RunTerminationActions) { |
| TerminationActionTest test_action; |
| const string kActionName = "action"; |
| |
| EXPECT_CALL(test_action, Done(_)); |
| manager()->RunTerminationActions(Bind(&TerminationActionTest::Done, |
| test_action.AsWeakPtr())); |
| |
| manager()->AddTerminationAction(TerminationActionTest::kActionName, |
| Bind(&TerminationActionTest::Action, |
| test_action.AsWeakPtr())); |
| test_action.set_manager(manager()); |
| EXPECT_CALL(test_action, Done(_)); |
| manager()->RunTerminationActions(Bind(&TerminationActionTest::Done, |
| test_action.AsWeakPtr())); |
| } |
| |
| TEST_F(ManagerTest, OnSuspendImminent) { |
| const int kSuspendId = 123; |
| EXPECT_TRUE(GetTerminationActions()->IsEmpty()); |
| EXPECT_CALL(*power_manager_, |
| ReportSuspendReadiness( |
| manager()->suspend_delay_id_for_testing(), kSuspendId)); |
| SetPowerManager(); |
| OnSuspendImminent(kSuspendId); |
| } |
| |
| TEST_F(ManagerTest, OnSuspendActionsComplete) { |
| const int kSuspendId = 54321; |
| Error error; |
| EXPECT_CALL(*power_manager_, |
| ReportSuspendReadiness( |
| manager()->suspend_delay_id_for_testing(), kSuspendId)); |
| SetPowerManager(); |
| OnSuspendActionsComplete(kSuspendId, error); |
| } |
| |
| TEST_F(ManagerTest, RecheckPortal) { |
| EXPECT_CALL(*mock_devices_[0].get(), RequestPortalDetection()) |
| .WillOnce(Return(false)); |
| EXPECT_CALL(*mock_devices_[1].get(), RequestPortalDetection()) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*mock_devices_[2].get(), RequestPortalDetection()) |
| .Times(0); |
| |
| manager()->RegisterDevice(mock_devices_[0]); |
| manager()->RegisterDevice(mock_devices_[1]); |
| manager()->RegisterDevice(mock_devices_[2]); |
| |
| manager()->RecheckPortal(NULL); |
| } |
| |
| TEST_F(ManagerTest, RecheckPortalOnService) { |
| MockServiceRefPtr service = new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager()); |
| EXPECT_CALL(*mock_devices_[0].get(), |
| IsConnectedToService(IsRefPtrTo(service))) |
| .WillOnce(Return(false)); |
| EXPECT_CALL(*mock_devices_[1].get(), |
| IsConnectedToService(IsRefPtrTo(service))) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*mock_devices_[1].get(), RestartPortalDetection()) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*mock_devices_[2].get(), IsConnectedToService(_)) |
| .Times(0); |
| |
| manager()->RegisterDevice(mock_devices_[0]); |
| manager()->RegisterDevice(mock_devices_[1]); |
| manager()->RegisterDevice(mock_devices_[2]); |
| |
| manager()->RecheckPortalOnService(service); |
| } |
| |
| TEST_F(ManagerTest, GetDefaultService) { |
| EXPECT_FALSE(manager()->GetDefaultService().get()); |
| EXPECT_EQ("/", GetDefaultServiceRpcIdentifier()); |
| |
| scoped_refptr<MockService> mock_service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| manager()->RegisterService(mock_service); |
| EXPECT_FALSE(manager()->GetDefaultService().get()); |
| EXPECT_EQ("/", GetDefaultServiceRpcIdentifier()); |
| |
| scoped_refptr<MockConnection> mock_connection( |
| new NiceMock<MockConnection>(device_info_.get())); |
| mock_service->set_mock_connection(mock_connection); |
| EXPECT_EQ(mock_service.get(), manager()->GetDefaultService().get()); |
| EXPECT_EQ(mock_service->GetRpcIdentifier(), GetDefaultServiceRpcIdentifier()); |
| |
| mock_service->set_mock_connection(NULL); |
| manager()->DeregisterService(mock_service); |
| } |
| |
| TEST_F(ManagerTest, GetServiceWithGUID) { |
| scoped_refptr<MockService> mock_service0( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| scoped_refptr<MockService> mock_service1( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| EXPECT_CALL(*mock_service0.get(), Configure(_, _)) |
| .Times(0); |
| EXPECT_CALL(*mock_service1.get(), Configure(_, _)) |
| .Times(0); |
| |
| manager()->RegisterService(mock_service0); |
| manager()->RegisterService(mock_service1); |
| |
| const string kGUID0 = "GUID0"; |
| const string kGUID1 = "GUID1"; |
| |
| { |
| Error error; |
| ServiceRefPtr service = manager()->GetServiceWithGUID(kGUID0, &error); |
| EXPECT_FALSE(error.IsSuccess()); |
| EXPECT_FALSE(service); |
| } |
| |
| KeyValueStore args; |
| args.SetString(flimflam::kGuidProperty, kGUID1); |
| |
| { |
| Error error; |
| ServiceRefPtr service = manager()->GetService(args, &error); |
| EXPECT_EQ(Error::kInvalidArguments, error.type()); |
| EXPECT_FALSE(service); |
| } |
| |
| mock_service0->SetGuid(kGUID0, NULL); |
| mock_service1->SetGuid(kGUID1, NULL); |
| |
| { |
| Error error; |
| ServiceRefPtr service = manager()->GetServiceWithGUID(kGUID0, &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| EXPECT_EQ(mock_service0.get(), service.get()); |
| } |
| |
| { |
| Error error; |
| EXPECT_CALL(*mock_service1.get(), Configure(_, &error)) |
| .Times(1); |
| ServiceRefPtr service = manager()->GetService(args, &error); |
| EXPECT_TRUE(error.IsSuccess()); |
| EXPECT_EQ(mock_service1.get(), service.get()); |
| } |
| |
| manager()->DeregisterService(mock_service0); |
| manager()->DeregisterService(mock_service1); |
| } |
| |
| |
| TEST_F(ManagerTest, CalculateStateOffline) { |
| EXPECT_FALSE(manager()->IsOnline()); |
| EXPECT_EQ("offline", manager()->CalculateState(NULL)); |
| |
| MockMetrics mock_metrics(dispatcher()); |
| SetMetrics(&mock_metrics); |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(_)) |
| .Times(AnyNumber()); |
| scoped_refptr<MockService> mock_service0( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| scoped_refptr<MockService> mock_service1( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| EXPECT_CALL(*mock_service0.get(), IsConnected()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_service1.get(), IsConnected()) |
| .WillRepeatedly(Return(false)); |
| |
| manager()->RegisterService(mock_service0); |
| manager()->RegisterService(mock_service1); |
| |
| EXPECT_FALSE(manager()->IsOnline()); |
| EXPECT_EQ("offline", manager()->CalculateState(NULL)); |
| |
| manager()->DeregisterService(mock_service0); |
| manager()->DeregisterService(mock_service1); |
| } |
| |
| TEST_F(ManagerTest, CalculateStateOnline) { |
| MockMetrics mock_metrics(dispatcher()); |
| SetMetrics(&mock_metrics); |
| EXPECT_CALL(mock_metrics, NotifyDefaultServiceChanged(_)) |
| .Times(AnyNumber()); |
| scoped_refptr<MockService> mock_service0( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| scoped_refptr<MockService> mock_service1( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| EXPECT_CALL(*mock_service0.get(), IsConnected()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*mock_service1.get(), IsConnected()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*mock_service0.get(), state()) |
| .WillRepeatedly(Return(Service::kStateIdle)); |
| EXPECT_CALL(*mock_service1.get(), state()) |
| .WillRepeatedly(Return(Service::kStateConnected)); |
| |
| manager()->RegisterService(mock_service0); |
| manager()->RegisterService(mock_service1); |
| CompleteServiceSort(); |
| |
| EXPECT_TRUE(manager()->IsOnline()); |
| EXPECT_EQ("online", manager()->CalculateState(NULL)); |
| |
| manager()->DeregisterService(mock_service0); |
| manager()->DeregisterService(mock_service1); |
| } |
| |
| TEST_F(ManagerTest, StartupPortalList) { |
| // Simulate loading value from the default profile. |
| const string kProfileValue("wifi,vpn"); |
| manager()->props_.check_portal_list = kProfileValue; |
| |
| EXPECT_EQ(kProfileValue, manager()->GetCheckPortalList(NULL)); |
| EXPECT_TRUE(manager()->IsPortalDetectionEnabled(Technology::kWifi)); |
| EXPECT_FALSE(manager()->IsPortalDetectionEnabled(Technology::kCellular)); |
| |
| const string kStartupValue("cellular,ethernet"); |
| manager()->SetStartupPortalList(kStartupValue); |
| // Ensure profile value is not overwritten, so when we save the default |
| // profile, the correct value will still be written. |
| EXPECT_EQ(kProfileValue, manager()->props_.check_portal_list); |
| |
| // However we should read back a different list. |
| EXPECT_EQ(kStartupValue, manager()->GetCheckPortalList(NULL)); |
| EXPECT_FALSE(manager()->IsPortalDetectionEnabled(Technology::kWifi)); |
| EXPECT_TRUE(manager()->IsPortalDetectionEnabled(Technology::kCellular)); |
| |
| const string kRuntimeValue("ppp"); |
| // Setting a runtime value over the control API should overwrite both |
| // the profile value and what we read back. |
| Error error; |
| manager()->mutable_store()->SetStringProperty( |
| flimflam::kCheckPortalListProperty, |
| kRuntimeValue, |
| &error); |
| ASSERT_TRUE(error.IsSuccess()); |
| EXPECT_EQ(kRuntimeValue, manager()->GetCheckPortalList(NULL)); |
| EXPECT_EQ(kRuntimeValue, manager()->props_.check_portal_list); |
| EXPECT_FALSE(manager()->IsPortalDetectionEnabled(Technology::kCellular)); |
| EXPECT_TRUE(manager()->IsPortalDetectionEnabled(Technology::kPPP)); |
| } |
| |
| TEST_F(ManagerTest, LinkMonitorEnabled) { |
| const string kEnabledTechnologies("wifi,vpn"); |
| manager()->props_.link_monitor_technologies = kEnabledTechnologies; |
| EXPECT_TRUE(manager()->IsTechnologyLinkMonitorEnabled(Technology::kWifi)); |
| EXPECT_FALSE( |
| manager()->IsTechnologyLinkMonitorEnabled(Technology::kCellular)); |
| } |
| |
| TEST_F(ManagerTest, IsDefaultProfile) { |
| EXPECT_TRUE(manager()->IsDefaultProfile(NULL)); |
| scoped_ptr<MockStore> store0(new MockStore); |
| EXPECT_TRUE(manager()->IsDefaultProfile(store0.get())); |
| scoped_refptr<MockProfile> profile( |
| new MockProfile(control_interface(), metrics(), manager(), "")); |
| EXPECT_CALL(*profile, GetConstStorage()).WillRepeatedly(Return(store0.get())); |
| AdoptProfile(manager(), profile); |
| EXPECT_TRUE(manager()->IsDefaultProfile(store0.get())); |
| EXPECT_FALSE(manager()->IsDefaultProfile(NULL)); |
| scoped_ptr<MockStore> store1(new MockStore); |
| EXPECT_FALSE(manager()->IsDefaultProfile(store1.get())); |
| } |
| |
| TEST_F(ManagerTest, SetEnabledStateForTechnology) { |
| Error error(Error::kOperationInitiated); |
| DisableTechnologyReplyHandler disable_technology_reply_handler; |
| ResultCallback disable_technology_callback( |
| Bind(&DisableTechnologyReplyHandler::ReportResult, |
| disable_technology_reply_handler.AsWeakPtr())); |
| EXPECT_CALL(disable_technology_reply_handler, ReportResult(_)).Times(0); |
| |
| manager()->SetEnabledStateForTechnology(flimflam::kTypeEthernet, false, |
| &error, disable_technology_callback); |
| EXPECT_TRUE(error.IsSuccess()); |
| |
| ON_CALL(*mock_devices_[0], technology()) |
| .WillByDefault(Return(Technology::kEthernet)); |
| ON_CALL(*mock_devices_[1], technology()) |
| .WillByDefault(Return(Technology::kCellular)); |
| ON_CALL(*mock_devices_[2], technology()) |
| .WillByDefault(Return(Technology::kCellular)); |
| |
| manager()->RegisterDevice(mock_devices_[0]); |
| manager()->RegisterDevice(mock_devices_[1]); |
| |
| // Ethernet Device is disabled, so disable succeeds immediately. |
| error.Populate(Error::kOperationInitiated); |
| manager()->SetEnabledStateForTechnology(flimflam::kTypeEthernet, false, |
| &error, disable_technology_callback); |
| EXPECT_TRUE(error.IsSuccess()); |
| |
| // Ethernet Device is enabled, and mock doesn't change error from |
| // kOperationInitiated, so expect disable to say operation in progress. |
| EXPECT_CALL(*mock_devices_[0], SetEnabledPersistent(false, _, _)); |
| mock_devices_[0]->enabled_ = true; |
| error.Populate(Error::kOperationInitiated); |
| manager()->SetEnabledStateForTechnology(flimflam::kTypeEthernet, false, |
| &error, disable_technology_callback); |
| EXPECT_TRUE(error.IsOngoing()); |
| |
| // Ethernet Device is disabled, and mock doesn't change error from |
| // kOperationInitiated, so expect enable to say operation in progress. |
| EXPECT_CALL(*mock_devices_[0], SetEnabledPersistent(true, _, _)); |
| mock_devices_[0]->enabled_ = false; |
| error.Populate(Error::kOperationInitiated); |
| manager()->SetEnabledStateForTechnology(flimflam::kTypeEthernet, true, |
| &error, disable_technology_callback); |
| EXPECT_TRUE(error.IsOngoing()); |
| |
| // Cellular Device is enabled, but disable failed. |
| EXPECT_CALL(*mock_devices_[1], SetEnabledPersistent(false, _, _)) |
| .WillOnce(WithArg<1>(Invoke(SetErrorPermissionDenied))); |
| mock_devices_[1]->enabled_ = true; |
| error.Populate(Error::kOperationInitiated); |
| manager()->SetEnabledStateForTechnology(flimflam::kTypeCellular, false, |
| &error, disable_technology_callback); |
| EXPECT_EQ(Error::kPermissionDenied, error.type()); |
| |
| // Multiple Cellular Devices in enabled state. Should indicate IsOngoing |
| // if one is in progress (even if the other completed immediately). |
| manager()->RegisterDevice(mock_devices_[2]); |
| EXPECT_CALL(*mock_devices_[1], SetEnabledPersistent(false, _, _)) |
| .WillOnce(WithArg<1>(Invoke(SetErrorPermissionDenied))); |
| EXPECT_CALL(*mock_devices_[2], SetEnabledPersistent(false, _, _)); |
| mock_devices_[1]->enabled_ = true; |
| mock_devices_[2]->enabled_ = true; |
| error.Populate(Error::kOperationInitiated); |
| manager()->SetEnabledStateForTechnology(flimflam::kTypeCellular, false, |
| &error, disable_technology_callback); |
| EXPECT_TRUE(error.IsOngoing()); |
| |
| // ...and order doesn't matter. |
| EXPECT_CALL(*mock_devices_[1], SetEnabledPersistent(false, _, _)); |
| EXPECT_CALL(*mock_devices_[2], SetEnabledPersistent(false, _, _)) |
| .WillOnce(WithArg<1>(Invoke(SetErrorPermissionDenied))); |
| mock_devices_[1]->enabled_ = true; |
| mock_devices_[2]->enabled_ = true; |
| error.Populate(Error::kOperationInitiated); |
| manager()->SetEnabledStateForTechnology(flimflam::kTypeCellular, false, |
| &error, disable_technology_callback); |
| EXPECT_TRUE(error.IsOngoing()); |
| Mock::VerifyAndClearExpectations(&disable_technology_reply_handler); |
| |
| // Multiple Cellular Devices in enabled state. Even if all disable |
| // operations complete asynchronously, we only get one call to the |
| // DisableTechnologyReplyHandler::ReportResult. |
| ResultCallback device1_result_callback; |
| ResultCallback device2_result_callback; |
| EXPECT_CALL(*mock_devices_[1], SetEnabledPersistent(false, _, _)) |
| .WillOnce(SaveArg<2>(&device1_result_callback)); |
| EXPECT_CALL(*mock_devices_[2], SetEnabledPersistent(false, _, _)) |
| .WillOnce(DoAll(WithArg<1>(Invoke(SetErrorPermissionDenied)), |
| SaveArg<2>(&device2_result_callback))); |
| EXPECT_CALL(disable_technology_reply_handler, ReportResult(_)); |
| mock_devices_[1]->enabled_ = true; |
| mock_devices_[2]->enabled_ = true; |
| error.Populate(Error::kOperationInitiated); |
| manager()->SetEnabledStateForTechnology(flimflam::kTypeCellular, false, |
| &error, disable_technology_callback); |
| EXPECT_TRUE(error.IsOngoing()); |
| device1_result_callback.Run(Error(Error::kSuccess)); |
| device2_result_callback.Run(Error(Error::kSuccess)); |
| } |
| |
| TEST_F(ManagerTest, IgnoredSearchList) { |
| scoped_ptr<MockResolver> resolver(new StrictMock<MockResolver>()); |
| vector<string> ignored_paths; |
| SetResolver(resolver.get()); |
| |
| const string kIgnored0 = "chromium.org"; |
| ignored_paths.push_back(kIgnored0); |
| EXPECT_CALL(*resolver.get(), set_ignored_search_list(ignored_paths)); |
| SetIgnoredDNSSearchPaths(kIgnored0, NULL); |
| EXPECT_EQ(kIgnored0, GetIgnoredDNSSearchPaths()); |
| |
| const string kIgnored1 = "google.com"; |
| const string kIgnoredSum = kIgnored0 + "," + kIgnored1; |
| ignored_paths.push_back(kIgnored1); |
| EXPECT_CALL(*resolver.get(), set_ignored_search_list(ignored_paths)); |
| SetIgnoredDNSSearchPaths(kIgnoredSum, NULL); |
| EXPECT_EQ(kIgnoredSum, GetIgnoredDNSSearchPaths()); |
| |
| ignored_paths.clear(); |
| EXPECT_CALL(*resolver.get(), set_ignored_search_list(ignored_paths)); |
| SetIgnoredDNSSearchPaths("", NULL); |
| EXPECT_EQ("", GetIgnoredDNSSearchPaths()); |
| |
| SetResolver(Resolver::GetInstance()); |
| } |
| |
| TEST_F(ManagerTest, ServiceStateChangeEmitsServices) { |
| // Test to make sure that every service state-change causes the |
| // Manager to emit a new service list. |
| scoped_refptr<MockService> mock_service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| EXPECT_CALL(*mock_service, state()) |
| .WillRepeatedly(Return(Service::kStateIdle)); |
| |
| manager()->RegisterService(mock_service); |
| EXPECT_CALL( |
| *manager_adaptor_, EmitRpcIdentifierArrayChanged( |
| flimflam::kServicesProperty, _)).Times(1); |
| EXPECT_CALL( |
| *manager_adaptor_, EmitRpcIdentifierArrayChanged( |
| flimflam::kServiceWatchListProperty, _)).Times(1); |
| CompleteServiceSort(); |
| |
| Mock::VerifyAndClearExpectations(manager_adaptor_); |
| EXPECT_CALL( |
| *manager_adaptor_, EmitRpcIdentifierArrayChanged( |
| flimflam::kServicesProperty, _)).Times(1); |
| EXPECT_CALL( |
| *manager_adaptor_, EmitRpcIdentifierArrayChanged( |
| flimflam::kServiceWatchListProperty, _)).Times(1); |
| manager()->UpdateService(mock_service.get()); |
| CompleteServiceSort(); |
| |
| manager()->DeregisterService(mock_service); |
| } |
| |
| TEST_F(ManagerTest, EnumerateServices) { |
| scoped_refptr<MockService> mock_service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| manager()->RegisterService(mock_service); |
| |
| EXPECT_CALL(*mock_service, state()) |
| .WillRepeatedly(Return(Service::kStateConnected)); |
| EXPECT_CALL(*mock_service, IsVisible()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_TRUE(EnumerateAvailableServices().empty()); |
| EXPECT_TRUE(EnumerateWatchedServices().empty()); |
| |
| EXPECT_CALL(*mock_service, state()) |
| .WillRepeatedly(Return(Service::kStateIdle)); |
| EXPECT_TRUE(EnumerateAvailableServices().empty()); |
| EXPECT_TRUE(EnumerateWatchedServices().empty()); |
| |
| EXPECT_CALL(*mock_service, IsVisible()) |
| .WillRepeatedly(Return(true)); |
| Service::ConnectState unwatched_states[] = { |
| Service::kStateUnknown, |
| Service::kStateIdle, |
| Service::kStateFailure |
| }; |
| for (size_t i = 0; i < arraysize(unwatched_states); ++i) { |
| EXPECT_CALL(*mock_service, state()) |
| .WillRepeatedly(Return(unwatched_states[i])); |
| EXPECT_FALSE(EnumerateAvailableServices().empty()); |
| EXPECT_TRUE(EnumerateWatchedServices().empty()); |
| } |
| |
| Service::ConnectState watched_states[] = { |
| Service::kStateAssociating, |
| Service::kStateConfiguring, |
| Service::kStateConnected, |
| Service::kStatePortal, |
| Service::kStateOnline |
| }; |
| for (size_t i = 0; i < arraysize(watched_states); ++i) { |
| EXPECT_CALL(*mock_service, state()) |
| .WillRepeatedly(Return(watched_states[i])); |
| EXPECT_FALSE(EnumerateAvailableServices().empty()); |
| EXPECT_FALSE(EnumerateWatchedServices().empty()); |
| } |
| |
| manager()->DeregisterService(mock_service); |
| } |
| |
| TEST_F(ManagerTest, ConnectToBestServices) { |
| scoped_refptr<MockService> wifi_service0( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| EXPECT_CALL(*wifi_service0.get(), state()) |
| .WillRepeatedly(Return(Service::kStateIdle)); |
| EXPECT_CALL(*wifi_service0.get(), IsConnected()) |
| .WillRepeatedly(Return(false)); |
| wifi_service0->SetConnectable(true); |
| wifi_service0->SetAutoConnect(true); |
| wifi_service0->SetSecurity(Service::kCryptoAes, true, true); |
| EXPECT_CALL(*wifi_service0.get(), technology()) |
| .WillRepeatedly(Return(Technology::kWifi)); |
| EXPECT_CALL(*wifi_service0.get(), IsVisible()) |
| .WillRepeatedly(Return(false)); |
| |
| scoped_refptr<MockService> wifi_service1( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| EXPECT_CALL(*wifi_service1.get(), state()) |
| .WillRepeatedly(Return(Service::kStateIdle)); |
| EXPECT_CALL(*wifi_service1.get(), IsVisible()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*wifi_service1.get(), IsConnected()) |
| .WillRepeatedly(Return(false)); |
| wifi_service1->SetAutoConnect(true); |
| wifi_service1->SetConnectable(true); |
| wifi_service1->SetSecurity(Service::kCryptoRc4, true, true); |
| EXPECT_CALL(*wifi_service1.get(), technology()) |
| .WillRepeatedly(Return(Technology::kWifi)); |
| |
| scoped_refptr<MockService> wifi_service2( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| EXPECT_CALL(*wifi_service2.get(), state()) |
| .WillRepeatedly(Return(Service::kStateConnected)); |
| EXPECT_CALL(*wifi_service2.get(), IsConnected()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*wifi_service2.get(), IsVisible()) |
| .WillRepeatedly(Return(true)); |
| wifi_service2->SetAutoConnect(true); |
| wifi_service2->SetConnectable(true); |
| wifi_service2->SetSecurity(Service::kCryptoNone, false, false); |
| EXPECT_CALL(*wifi_service2.get(), technology()) |
| .WillRepeatedly(Return(Technology::kWifi)); |
| |
| manager()->RegisterService(wifi_service0); |
| manager()->RegisterService(wifi_service1); |
| manager()->RegisterService(wifi_service2); |
| |
| CompleteServiceSort(); |
| EXPECT_TRUE(ServiceOrderIs(wifi_service2, wifi_service0)); |
| |
| scoped_refptr<MockService> cell_service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| EXPECT_CALL(*cell_service.get(), state()) |
| .WillRepeatedly(Return(Service::kStateConnected)); |
| EXPECT_CALL(*cell_service.get(), IsConnected()) |
| .WillRepeatedly(Return(true)); |
| EXPECT_CALL(*cell_service.get(), IsVisible()) |
| .WillRepeatedly(Return(true)); |
| wifi_service2->SetAutoConnect(true); |
| cell_service->SetConnectable(true); |
| EXPECT_CALL(*cell_service.get(), technology()) |
| .WillRepeatedly(Return(Technology::kCellular)); |
| manager()->RegisterService(cell_service); |
| |
| scoped_refptr<MockService> vpn_service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| EXPECT_CALL(*vpn_service.get(), state()) |
| .WillRepeatedly(Return(Service::kStateIdle)); |
| EXPECT_CALL(*vpn_service.get(), IsConnected()) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*vpn_service.get(), IsVisible()) |
| .WillRepeatedly(Return(true)); |
| wifi_service2->SetAutoConnect(false); |
| vpn_service->SetConnectable(true); |
| EXPECT_CALL(*vpn_service.get(), technology()) |
| .WillRepeatedly(Return(Technology::kVPN)); |
| manager()->RegisterService(vpn_service); |
| |
| // The connected services should be at the top. |
| EXPECT_TRUE(ServiceOrderIs(wifi_service2, cell_service)); |
| |
| EXPECT_CALL(*wifi_service0.get(), Connect(_, _)).Times(0); // Not visible. |
| EXPECT_CALL(*wifi_service1.get(), Connect(_, _)); |
| EXPECT_CALL(*wifi_service2.get(), Connect(_, _)).Times(0); // Lower prio. |
| EXPECT_CALL(*cell_service.get(), Connect(_, _)).Times(0); // Is connected. |
| EXPECT_CALL(*vpn_service.get(), Connect(_, _)).Times(0); // Not autoconnect. |
| |
| manager()->ConnectToBestServices(NULL); |
| dispatcher()->DispatchPendingEvents(); |
| |
| // After this operation, since the Connect calls above are mocked and |
| // no actual state changes have occurred, we should expect that the |
| // service sorting order will not have changed. |
| EXPECT_TRUE(ServiceOrderIs(wifi_service2, cell_service)); |
| } |
| |
| TEST_F(ManagerTest, VerifyWhenNotConnected) { |
| const string kFakeCertificate("fake cert"); |
| const string kFakePublicKey("fake public key"); |
| const string kFakeNonce("fake public key"); |
| const string kFakeSignedData("fake signed data"); |
| const string kFakeUdn("fake udn"); |
| const vector<uint8_t> kSSID(10, 87); |
| const string kConfiguredSSID("AConfiguredDestination"); |
| const vector<uint8_t> kConfiguredSSIDVector(kConfiguredSSID.begin(), |
| kConfiguredSSID.end()); |
| const string kConfiguredBSSID("aa:bb:aa:bb:aa:bb"); |
| scoped_refptr<MockWiFiService> mock_destination( |
| new NiceMock<MockWiFiService>(control_interface(), dispatcher(), |
| metrics(), manager(), wifi_provider_, |
| kSSID, "", "none", false)); |
| // Register this service, but don't mark it as connected. |
| manager()->RegisterService(mock_destination); |
| // Verify that if we're not connected to anything, verification fails. |
| { |
| LOG(INFO) << "Can't verify if not connected."; |
| EXPECT_CALL(*crypto_util_proxy_, |
| VerifyDestination(_, _, _, _, _, _, _, _, _)).Times(0); |
| Error error(Error::kOperationInitiated); |
| manager()->VerifyDestination(kFakeCertificate, kFakePublicKey, kFakeNonce, |
| kFakeSignedData, kFakeUdn, "", "", |
| ResultBoolCallback(), &error); |
| EXPECT_TRUE(error.IsFailure()); |
| Mock::VerifyAndClearExpectations(crypto_util_proxy_); |
| } |
| { |
| // However, if the destination is already configured, we might be |
| // connected to it via something other than WiFi, and we shouldn't |
| // enforce the WiFi check. |
| EXPECT_CALL(*crypto_util_proxy_, |
| VerifyDestination(kFakeCertificate, kFakePublicKey, kFakeNonce, |
| kFakeSignedData, kFakeUdn, |
| kConfiguredSSIDVector, kConfiguredBSSID, |
| _, _)).Times(1).WillOnce(Return(true)); |
| Error error(Error::kOperationInitiated); |
| manager()->VerifyDestination(kFakeCertificate, kFakePublicKey, kFakeNonce, |
| kFakeSignedData, kFakeUdn, kConfiguredSSID, |
| kConfiguredBSSID, ResultBoolCallback(), |
| &error); |
| EXPECT_FALSE(error.IsFailure()); |
| Mock::VerifyAndClearExpectations(crypto_util_proxy_); |
| } |
| } |
| |
| TEST_F(ManagerTest, VerifyDestination) { |
| const string kFakeCertificate("fake cert"); |
| const string kFakePublicKey("fake public key"); |
| const string kFakeNonce("fake public key"); |
| const string kFakeSignedData("fake signed data"); |
| const string kFakeUdn("fake udn"); |
| const char kSSIDStr[] = "fake ssid"; |
| const vector<uint8_t> kSSID(kSSIDStr, kSSIDStr + arraysize(kSSIDStr)); |
| const string kConfiguredSSID("AConfiguredDestination"); |
| const vector<uint8_t> kConfiguredSSIDVector(kConfiguredSSID.begin(), |
| kConfiguredSSID.end()); |
| const string kConfiguredBSSID("aa:bb:aa:bb:aa:bb"); |
| const string kFakeData("muffin man"); |
| scoped_refptr<MockWiFiService> mock_destination( |
| new NiceMock<MockWiFiService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| wifi_provider_, |
| kSSID, |
| "", |
| "none", |
| false)); |
| manager()->RegisterService(mock_destination); |
| // Making the service look online will let service lookup in |
| // VerifyDestinatoin succeed. |
| EXPECT_CALL(*mock_destination.get(), IsConnected()) |
| .WillRepeatedly(Return(true)); |
| StrictMock<DestinationVerificationTest> dv_test; |
| |
| // Lead off by verifying that the basic VerifyDestination flow works. |
| { |
| LOG(INFO) << "Basic VerifyDestination flow."; |
| ResultBoolCallback passed_down_callback; |
| EXPECT_CALL(*crypto_util_proxy_, VerifyDestination(kFakeCertificate, |
| kFakePublicKey, |
| kFakeNonce, |
| kFakeSignedData, |
| kFakeUdn, |
| kSSID, |
| _, |
| _, |
| _)) |
| .Times(1) |
| .WillOnce(DoAll(SaveArg<7>(&passed_down_callback), Return(true))); |
| // Ask the manager to verify the current destination. This should look |
| // up our previously registered service, and pass some metadata about |
| // that service down to the CryptoUtilProxy to verify. |
| Error error(Error::kOperationInitiated); |
| ResultBoolCallback cb = Bind( |
| &DestinationVerificationTest::ResultBoolCallbackStub, |
| dv_test.AsWeakPtr()); |
| manager()->VerifyDestination(kFakeCertificate, |
| kFakePublicKey, |
| kFakeNonce, |
| kFakeSignedData, |
| kFakeUdn, |
| // Ask to be verified against that service. |
| "", "", |
| cb, |
| &error); |
| // We assert here, because if the operation is not ongoing, it is |
| // inconsistent with shim behavior to call the callback anyway. |
| ASSERT_TRUE(error.IsOngoing()); |
| Mock::VerifyAndClearExpectations(crypto_util_proxy_); |
| EXPECT_CALL(dv_test, ResultBoolCallbackStub(_, true)).Times(1); |
| // Call the callback passed into the CryptoUtilProxy, which |
| // should find its way into the callback passed into the manager. |
| // In real code, that callback passed into the manager is from the |
| // DBus adaptor. |
| Error e; |
| passed_down_callback.Run(e, true); |
| Mock::VerifyAndClearExpectations(&dv_test); |
| } |
| |
| // Now for a slightly more complex variant. When we encrypt data, |
| // we do the same verification step but monkey with the callback to |
| // link ourselves to an encrypt step afterward. |
| { |
| LOG(INFO) << "Basic VerifyAndEncryptData"; |
| ResultBoolCallback passed_down_callback; |
| EXPECT_CALL(*crypto_util_proxy_, VerifyDestination(kFakeCertificate, |
| kFakePublicKey, |
| kFakeNonce, |
| kFakeSignedData, |
| kFakeUdn, |
| kSSID, |
| _, |
| _, |
| _)) |
| .WillOnce(DoAll(SaveArg<7>(&passed_down_callback), Return(true))); |
| |
| Error error(Error::kOperationInitiated); |
| ResultStringCallback cb = Bind( |
| &DestinationVerificationTest::ResultStringCallbackStub, |
| dv_test.AsWeakPtr()); |
| manager()->VerifyAndEncryptData(kFakeCertificate, |
| kFakePublicKey, |
| kFakeNonce, |
| kFakeSignedData, |
| kFakeUdn, |
| "", "", |
| kFakeData, |
| cb, |
| &error); |
| ASSERT_TRUE(error.IsOngoing()); |
| Mock::VerifyAndClearExpectations(crypto_util_proxy_); |
| // Now, if we call that passed down callback, we should see encrypt being |
| // called. |
| ResultStringCallback second_passed_down_callback; |
| EXPECT_CALL(*crypto_util_proxy_, EncryptData(kFakePublicKey, |
| kFakeData, |
| _, |
| _)) |
| .Times(1) |
| .WillOnce(DoAll(SaveArg<2>(&second_passed_down_callback), |
| Return(true))); |
| Error e; |
| passed_down_callback.Run(e, true); |
| Mock::VerifyAndClearExpectations(crypto_util_proxy_); |
| EXPECT_CALL(dv_test, ResultStringCallbackStub(_, _)).Times(1); |
| // And if we call the second passed down callback, we should see the |
| // original function we passed down to VerifyDestination getting called. |
| e.Reset(); |
| second_passed_down_callback.Run(e, ""); |
| Mock::VerifyAndClearExpectations(&dv_test); |
| } |
| |
| // If verification fails on the way to trying to encrypt, we should ditch |
| // without calling encrypt at all. |
| { |
| LOG(INFO) << "Failed VerifyAndEncryptData"; |
| ResultBoolCallback passed_down_callback; |
| EXPECT_CALL(*crypto_util_proxy_, VerifyDestination(kFakeCertificate, |
| kFakePublicKey, |
| kFakeNonce, |
| kFakeSignedData, |
| kFakeUdn, |
| kSSID, |
| _, |
| _, |
| _)) |
| .WillOnce(DoAll(SaveArg<7>(&passed_down_callback), Return(true))); |
| |
| Error error(Error::kOperationInitiated); |
| ResultStringCallback cb = Bind( |
| &DestinationVerificationTest::ResultStringCallbackStub, |
| dv_test.AsWeakPtr()); |
| manager()->VerifyAndEncryptData(kFakeCertificate, |
| kFakePublicKey, |
| kFakeNonce, |
| kFakeSignedData, |
| kFakeUdn, |
| "", "", |
| kFakeData, |
| cb, |
| &error); |
| ASSERT_TRUE(error.IsOngoing()); |
| Mock::VerifyAndClearExpectations(crypto_util_proxy_); |
| Error e(Error::kOperationFailed); |
| EXPECT_CALL(*crypto_util_proxy_, EncryptData(_, _, _, _)).Times(0); |
| // Although we're ditching, this callback is what cleans up the pending |
| // DBus call. |
| EXPECT_CALL(dv_test, ResultStringCallbackStub(_, string(""))).Times(1); |
| passed_down_callback.Run(e, false); |
| Mock::VerifyAndClearExpectations(&dv_test); |
| } |
| } |
| |
| TEST_F(ManagerTest, IsProfileBefore) { |
| scoped_refptr<MockProfile> profile0( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| scoped_refptr<MockProfile> profile1( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| |
| AdoptProfile(manager(), profile0); |
| AdoptProfile(manager(), profile1); // profile1 is after profile0. |
| EXPECT_TRUE(manager()->IsProfileBefore(profile0, profile1)); |
| EXPECT_FALSE(manager()->IsProfileBefore(profile1, profile0)); |
| |
| // A few abnormal cases, but it's good to track their behavior. |
| scoped_refptr<MockProfile> profile2( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| EXPECT_TRUE(manager()->IsProfileBefore(profile0, profile2)); |
| EXPECT_TRUE(manager()->IsProfileBefore(profile1, profile2)); |
| EXPECT_FALSE(manager()->IsProfileBefore(profile2, profile0)); |
| EXPECT_FALSE(manager()->IsProfileBefore(profile2, profile1)); |
| } |
| |
| TEST_F(ManagerTest, GetLoadableProfileEntriesForService) { |
| MockStore storage0; |
| MockStore storage1; |
| MockStore storage2; |
| |
| scoped_refptr<MockProfile> profile0( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| scoped_refptr<MockProfile> profile1( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| scoped_refptr<MockProfile> profile2( |
| new NiceMock<MockProfile>( |
| control_interface(), metrics(), manager(), "")); |
| |
| AdoptProfile(manager(), profile0); |
| AdoptProfile(manager(), profile1); |
| AdoptProfile(manager(), profile2); |
| |
| scoped_refptr<MockService> service( |
| new NiceMock<MockService>(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| |
| EXPECT_CALL(*profile0, GetConstStorage()).WillOnce(Return(&storage0)); |
| EXPECT_CALL(*profile1, GetConstStorage()).WillOnce(Return(&storage1)); |
| EXPECT_CALL(*profile2, GetConstStorage()).WillOnce(Return(&storage2)); |
| |
| const string kEntry0("aluminum_crutch"); |
| const string kEntry2("rehashed_faces"); |
| |
| EXPECT_CALL(*service, GetLoadableStorageIdentifier(Ref(storage0))) |
| .WillOnce(Return(kEntry0)); |
| EXPECT_CALL(*service, GetLoadableStorageIdentifier(Ref(storage1))) |
| .WillOnce(Return("")); |
| EXPECT_CALL(*service, GetLoadableStorageIdentifier(Ref(storage2))) |
| .WillOnce(Return(kEntry2)); |
| |
| const string kProfileRpc0("service_station"); |
| const string kProfileRpc2("crystal_tiaras"); |
| |
| EXPECT_CALL(*profile0, GetRpcIdentifier()).WillOnce(Return(kProfileRpc0)); |
| EXPECT_CALL(*profile1, GetRpcIdentifier()).Times(0); |
| EXPECT_CALL(*profile2, GetRpcIdentifier()).WillOnce(Return(kProfileRpc2)); |
| |
| map<string, string> entries = |
| manager()->GetLoadableProfileEntriesForService(service); |
| EXPECT_EQ(2, entries.size()); |
| EXPECT_TRUE(ContainsKey(entries, kProfileRpc0)); |
| EXPECT_TRUE(ContainsKey(entries, kProfileRpc2)); |
| EXPECT_EQ(kEntry0, entries[kProfileRpc0]); |
| EXPECT_EQ(kEntry2, entries[kProfileRpc2]); |
| } |
| |
| TEST_F(ManagerTest, InitializeProfilesInformsProviders) { |
| // We need a real glib here, so that profiles are persisted. |
| GLib glib; |
| ScopedTempDir temp_dir; |
| ASSERT_TRUE(temp_dir.CreateUniqueTempDir()); |
| Manager manager(control_interface(), |
| dispatcher(), |
| metrics(), |
| &glib, |
| run_path(), |
| storage_path(), |
| temp_dir.path().value()); |
| // Can't use |wifi_provider_|, because it's owned by the Manager |
| // object in the fixture. |
| MockWiFiProvider *wifi_provider = new NiceMock<MockWiFiProvider>(); |
| manager.wifi_provider_.reset(wifi_provider); // pass ownership |
| manager.UpdateProviderMapping(); |
| // Give manager a valid place to write the user profile list. |
| manager.user_profile_list_path_ = temp_dir.path().Append("user_profile_list"); |
| |
| // With no user profiles, the WiFiProvider should be called once |
| // (for the default profile). |
| EXPECT_CALL(*wifi_provider, CreateServicesFromProfile(_)); |
| manager.InitializeProfiles(); |
| Mock::VerifyAndClearExpectations(wifi_provider); |
| |
| // With |n| user profiles, the WiFiProvider should be called |n+1| |
| // times. First, create 2 user profiles... |
| const char kProfile0[] = "~user/profile0"; |
| const char kProfile1[] = "~user/profile1"; |
| string profile_rpc_path; |
| Error error; |
| manager.CreateProfile(kProfile0, &profile_rpc_path, &error); |
| manager.PushProfile(kProfile0, &profile_rpc_path, &error); |
| manager.CreateProfile(kProfile1, &profile_rpc_path, &error); |
| manager.PushProfile(kProfile1, &profile_rpc_path, &error); |
| |
| // ... then reset manager state ... |
| manager.profiles_.clear(); |
| |
| // ...then check that the WiFiProvider is notified about all three |
| // profiles (one default, two user). |
| EXPECT_CALL(*wifi_provider, CreateServicesFromProfile(_)).Times(3); |
| manager.InitializeProfiles(); |
| Mock::VerifyAndClearExpectations(wifi_provider); |
| } |
| |
| TEST_F(ManagerTest, InitializeProfilesHandlesDefaults) { |
| // We need a real glib here, so that profiles are persisted. |
| GLib glib; |
| ScopedTempDir temp_dir; |
| scoped_ptr<Manager> manager; |
| ASSERT_TRUE(temp_dir.CreateUniqueTempDir()); |
| |
| // Instantiate a Manager with empty persistent storage. Check that |
| // defaults are set. |
| // |
| // Note that we use the same directory for default and user profiles. |
| // This doesn't affect the test results, because we don't push a |
| // user profile. |
| manager.reset(new Manager(control_interface(), |
| dispatcher(), |
| metrics(), |
| &glib, |
| run_path(), |
| temp_dir.path().value(), |
| temp_dir.path().value())); |
| manager->InitializeProfiles(); |
| EXPECT_EQ(PortalDetector::kDefaultCheckPortalList, |
| manager->props_.check_portal_list); |
| EXPECT_EQ(Resolver::kDefaultIgnoredSearchList, |
| manager->props_.ignored_dns_search_paths); |
| EXPECT_EQ(LinkMonitor::kDefaultLinkMonitorTechnologies, |
| manager->props_.link_monitor_technologies); |
| EXPECT_EQ(PortalDetector::kDefaultURL, |
| manager->props_.portal_url); |
| EXPECT_EQ(PortalDetector::kDefaultCheckIntervalSeconds, |
| manager->props_.portal_check_interval_seconds); |
| |
| // Change one of the settings. |
| static const string kCustomCheckPortalList = "fiber0"; |
| Error error; |
| manager->SetCheckPortalList(kCustomCheckPortalList, &error); |
| manager->profiles_[0]->Save(); |
| |
| // Instantiate a new manager. It should have our settings for |
| // check_portal_list, rather than the default. |
| manager.reset(new Manager(control_interface(), |
| dispatcher(), |
| metrics(), |
| &glib, |
| run_path(), |
| temp_dir.path().value(), |
| temp_dir.path().value())); |
| manager->InitializeProfiles(); |
| EXPECT_EQ(kCustomCheckPortalList, manager->props_.check_portal_list); |
| |
| // If we clear the persistent storage, we again get the default value. |
| ASSERT_TRUE(temp_dir.Delete()); |
| ASSERT_TRUE(temp_dir.CreateUniqueTempDir()); |
| manager.reset(new Manager(control_interface(), |
| dispatcher(), |
| metrics(), |
| &glib, |
| run_path(), |
| temp_dir.path().value(), |
| temp_dir.path().value())); |
| manager->InitializeProfiles(); |
| EXPECT_EQ(PortalDetector::kDefaultCheckPortalList, |
| manager->props_.check_portal_list); |
| } |
| |
| // Custom property setters should return false, and make no changes, if |
| // the new value is the same as the old value. |
| TEST_F(ManagerTest, CustomSetterNoopChange) { |
| // SetCheckPortalList |
| { |
| static const string kCheckPortalList = "weird-device,weirder-device"; |
| Error error; |
| // Set to known value. |
| EXPECT_TRUE(SetCheckPortalList(kCheckPortalList, &error)); |
| EXPECT_TRUE(error.IsSuccess()); |
| // Set to same value. |
| EXPECT_FALSE(SetCheckPortalList(kCheckPortalList, &error)); |
| EXPECT_TRUE(error.IsSuccess()); |
| } |
| |
| // SetIgnoredDNSSearchPaths |
| { |
| NiceMock<MockResolver> resolver; |
| static const string kIgnoredPaths = "example.com,example.org"; |
| Error error; |
| SetResolver(&resolver); |
| // Set to known value. |
| EXPECT_CALL(resolver, set_ignored_search_list(_)); |
| EXPECT_TRUE(SetIgnoredDNSSearchPaths(kIgnoredPaths, &error)); |
| EXPECT_TRUE(error.IsSuccess()); |
| Mock::VerifyAndClearExpectations(&resolver); |
| // Set to same value. |
| EXPECT_CALL(resolver, set_ignored_search_list(_)).Times(0); |
| EXPECT_FALSE(SetIgnoredDNSSearchPaths(kIgnoredPaths, &error)); |
| EXPECT_TRUE(error.IsSuccess()); |
| Mock::VerifyAndClearExpectations(&resolver); |
| } |
| } |
| |
| } // namespace shill |