| // Copyright (c) 2012 The Chromium OS Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "shill/default_profile.h" |
| |
| #include <map> |
| #include <memory> |
| #include <set> |
| #include <string> |
| #include <vector> |
| |
| #include <base/files/file_path.h> |
| #include <chromeos/dbus/service_constants.h> |
| #include <gtest/gtest.h> |
| #include <gmock/gmock.h> |
| |
| #include "shill/connectivity_trial.h" |
| #include "shill/key_file_store.h" |
| #include "shill/link_monitor.h" |
| #include "shill/manager.h" |
| #include "shill/mock_control.h" |
| #include "shill/mock_device.h" |
| #include "shill/mock_service.h" |
| #include "shill/mock_store.h" |
| #include "shill/portal_detector.h" |
| #include "shill/property_store_unittest.h" |
| #include "shill/resolver.h" |
| |
| #if !defined(DISABLE_WIFI) |
| #include "shill/wifi/mock_wifi_provider.h" |
| #include "shill/wifi/wifi_service.h" |
| #endif // DISABLE_WIFI |
| |
| using base::FilePath; |
| using std::map; |
| using std::set; |
| using std::string; |
| using std::unique_ptr; |
| using std::vector; |
| using ::testing::_; |
| using ::testing::DoAll; |
| using ::testing::Return; |
| using ::testing::SetArgumentPointee; |
| |
| namespace shill { |
| |
| class DefaultProfileTest : public PropertyStoreTest { |
| public: |
| DefaultProfileTest() |
| : profile_(new DefaultProfile(control_interface(), |
| metrics(), |
| manager(), |
| FilePath(storage_path()), |
| DefaultProfile::kDefaultId, |
| properties_)), |
| device_(new MockDevice(control_interface(), |
| dispatcher(), |
| metrics(), |
| manager(), |
| "null0", |
| "addr0", |
| 0)) { |
| } |
| |
| virtual ~DefaultProfileTest() {} |
| |
| protected: |
| static const char kTestStoragePath[]; |
| |
| scoped_refptr<DefaultProfile> profile_; |
| scoped_refptr<MockDevice> device_; |
| Manager::Properties properties_; |
| }; |
| |
| const char DefaultProfileTest::kTestStoragePath[] = "/no/where"; |
| |
| TEST_F(DefaultProfileTest, GetProperties) { |
| // DBusAdaptor::GetProperties() will iterate over all the accessors |
| // provided by Profile. The |kEntriesProperty| accessor calls |
| // GetGroups() on the StoreInterface. |
| unique_ptr<MockStore> storage(new MockStore()); |
| set<string> empty_group_set; |
| EXPECT_CALL(*storage.get(), GetGroups()) |
| .WillRepeatedly(Return(empty_group_set)); |
| profile_->set_storage(storage.release()); |
| |
| Error error(Error::kInvalidProperty, ""); |
| { |
| chromeos::VariantDictionary props; |
| Error error; |
| profile_->store().GetProperties(&props, &error); |
| ASSERT_FALSE(props.find(kOfflineModeProperty) == props.end()); |
| EXPECT_TRUE(props[kOfflineModeProperty].IsTypeCompatible<bool>()); |
| EXPECT_FALSE(props[kOfflineModeProperty].Get<bool>()); |
| } |
| properties_.offline_mode = true; |
| { |
| chromeos::VariantDictionary props; |
| Error error; |
| profile_->store().GetProperties(&props, &error); |
| ASSERT_FALSE(props.find(kOfflineModeProperty) == props.end()); |
| EXPECT_TRUE(props[kOfflineModeProperty].IsTypeCompatible<bool>()); |
| EXPECT_TRUE(props[kOfflineModeProperty].Get<bool>()); |
| } |
| { |
| Error error(Error::kInvalidProperty, ""); |
| EXPECT_FALSE( |
| profile_->mutable_store()->SetBoolProperty( |
| kOfflineModeProperty, |
| true, |
| &error)); |
| } |
| } |
| |
| TEST_F(DefaultProfileTest, Save) { |
| unique_ptr<MockStore> storage(new MockStore()); |
| EXPECT_CALL(*storage.get(), SetBool(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageArpGateway, |
| true)) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*storage.get(), SetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageName, |
| DefaultProfile::kDefaultId)) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*storage.get(), SetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageHostName, |
| "")) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*storage.get(), SetBool(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageOfflineMode, |
| false)) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*storage.get(), SetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageCheckPortalList, |
| "")) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*storage.get(), |
| SetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageIgnoredDNSSearchPaths, |
| "")) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*storage.get(), |
| SetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageLinkMonitorTechnologies, |
| "")) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*storage.get(), |
| SetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageNoAutoConnectTechnologies, |
| "")) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*storage.get(), |
| SetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageProhibitedTechnologies, |
| "")) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*storage.get(), SetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStoragePortalURL, |
| "")) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*storage.get(), |
| SetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStoragePortalCheckInterval, |
| "0")) |
| .WillOnce(Return(true)); |
| EXPECT_CALL(*storage.get(), Flush()).WillOnce(Return(true)); |
| |
| EXPECT_CALL(*device_.get(), Save(storage.get())).Times(0); |
| profile_->set_storage(storage.release()); |
| |
| manager()->RegisterDevice(device_); |
| ASSERT_TRUE(profile_->Save()); |
| manager()->DeregisterDevice(device_); |
| } |
| |
| TEST_F(DefaultProfileTest, LoadManagerDefaultProperties) { |
| unique_ptr<MockStore> storage(new MockStore()); |
| Manager::Properties manager_props; |
| EXPECT_CALL(*storage.get(), GetBool(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageArpGateway, |
| &manager_props.arp_gateway)) |
| .WillOnce(Return(false)); |
| EXPECT_CALL(*storage.get(), GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageHostName, |
| &manager_props.host_name)) |
| .WillOnce(Return(false)); |
| EXPECT_CALL(*storage.get(), GetBool(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageOfflineMode, |
| &manager_props.offline_mode)) |
| .WillOnce(Return(false)); |
| EXPECT_CALL(*storage.get(), GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageCheckPortalList, |
| &manager_props.check_portal_list)) |
| .WillOnce(Return(false)); |
| EXPECT_CALL(*storage.get(), |
| GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageIgnoredDNSSearchPaths, |
| &manager_props.ignored_dns_search_paths)) |
| .WillOnce(Return(false)); |
| EXPECT_CALL(*storage.get(), |
| GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageLinkMonitorTechnologies, |
| _)) |
| .WillOnce(Return(false)); |
| EXPECT_CALL(*storage.get(), |
| GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageNoAutoConnectTechnologies, |
| _)) |
| .WillOnce(Return(false)); |
| EXPECT_CALL(*storage.get(), |
| GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageProhibitedTechnologies, |
| _)) |
| .WillOnce(Return(false)); |
| EXPECT_CALL(*storage.get(), GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStoragePortalURL, |
| &manager_props.portal_url)) |
| .WillOnce(Return(false)); |
| EXPECT_CALL(*storage.get(), |
| GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStoragePortalCheckInterval, |
| _)) |
| .WillOnce(Return(false)); |
| |
| profile_->set_storage(storage.release()); |
| |
| profile_->LoadManagerProperties(&manager_props); |
| EXPECT_TRUE(manager_props.arp_gateway); |
| EXPECT_EQ("", manager_props.host_name); |
| EXPECT_FALSE(manager_props.offline_mode); |
| EXPECT_EQ(PortalDetector::kDefaultCheckPortalList, |
| manager_props.check_portal_list); |
| EXPECT_EQ(Resolver::kDefaultIgnoredSearchList, |
| manager_props.ignored_dns_search_paths); |
| EXPECT_EQ(LinkMonitor::kDefaultLinkMonitorTechnologies, |
| manager_props.link_monitor_technologies); |
| EXPECT_EQ("", manager_props.no_auto_connect_technologies); |
| EXPECT_EQ(ConnectivityTrial::kDefaultURL, manager_props.portal_url); |
| EXPECT_EQ(PortalDetector::kDefaultCheckIntervalSeconds, |
| manager_props.portal_check_interval_seconds); |
| EXPECT_EQ("", manager_props.prohibited_technologies); |
| } |
| |
| TEST_F(DefaultProfileTest, LoadManagerProperties) { |
| unique_ptr<MockStore> storage(new MockStore()); |
| const string host_name("hostname"); |
| EXPECT_CALL(*storage.get(), GetBool(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageArpGateway, |
| _)) |
| .WillOnce(DoAll(SetArgumentPointee<2>(false), Return(true))); |
| EXPECT_CALL(*storage.get(), GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageHostName, |
| _)) |
| .WillOnce(DoAll(SetArgumentPointee<2>(host_name), Return(true))); |
| EXPECT_CALL(*storage.get(), GetBool(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageOfflineMode, |
| _)) |
| .WillOnce(DoAll(SetArgumentPointee<2>(true), Return(true))); |
| const string portal_list("technology1,technology2"); |
| EXPECT_CALL(*storage.get(), GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageCheckPortalList, |
| _)) |
| .WillOnce(DoAll(SetArgumentPointee<2>(portal_list), Return(true))); |
| const string ignored_paths("chromium.org,google.com"); |
| EXPECT_CALL(*storage.get(), |
| GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageIgnoredDNSSearchPaths, |
| _)) |
| .WillOnce(DoAll(SetArgumentPointee<2>(ignored_paths), Return(true))); |
| const string link_monitor_technologies("ethernet,wimax"); |
| EXPECT_CALL(*storage.get(), |
| GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageLinkMonitorTechnologies, |
| _)) |
| .WillOnce(DoAll(SetArgumentPointee<2>(link_monitor_technologies), |
| Return(true))); |
| const string no_auto_connect_technologies("wifi,cellular"); |
| EXPECT_CALL(*storage.get(), |
| GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageNoAutoConnectTechnologies, |
| _)) |
| .WillOnce(DoAll(SetArgumentPointee<2>(no_auto_connect_technologies), |
| Return(true))); |
| const string portal_url("http://www.chromium.org"); |
| EXPECT_CALL(*storage.get(), GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStoragePortalURL, |
| _)) |
| .WillOnce(DoAll(SetArgumentPointee<2>(portal_url), Return(true))); |
| const string portal_check_interval_string("10"); |
| const int portal_check_interval_int = 10; |
| EXPECT_CALL(*storage.get(), |
| GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStoragePortalCheckInterval, |
| _)) |
| .WillOnce(DoAll(SetArgumentPointee<2>(portal_check_interval_string), |
| Return(true))); |
| const string prohibited_technologies("vpn,wimax"); |
| EXPECT_CALL(*storage.get(), |
| GetString(DefaultProfile::kStorageId, |
| DefaultProfile::kStorageProhibitedTechnologies, |
| _)) |
| .WillOnce(DoAll(SetArgumentPointee<2>(prohibited_technologies), |
| Return(true))); |
| profile_->set_storage(storage.release()); |
| |
| Manager::Properties manager_props; |
| profile_->LoadManagerProperties(&manager_props); |
| EXPECT_FALSE(manager_props.arp_gateway); |
| EXPECT_EQ(host_name, manager_props.host_name); |
| EXPECT_TRUE(manager_props.offline_mode); |
| EXPECT_EQ(portal_list, manager_props.check_portal_list); |
| EXPECT_EQ(ignored_paths, manager_props.ignored_dns_search_paths); |
| EXPECT_EQ(link_monitor_technologies, |
| manager_props.link_monitor_technologies); |
| EXPECT_EQ(no_auto_connect_technologies, |
| manager_props.no_auto_connect_technologies); |
| EXPECT_EQ(portal_url, manager_props.portal_url); |
| EXPECT_EQ(portal_check_interval_int, |
| manager_props.portal_check_interval_seconds); |
| EXPECT_EQ(prohibited_technologies, manager_props.prohibited_technologies); |
| } |
| |
| TEST_F(DefaultProfileTest, GetStoragePath) { |
| FilePath path; |
| EXPECT_TRUE(profile_->GetStoragePath(&path)); |
| EXPECT_EQ(storage_path() + "/default.profile", path.value()); |
| } |
| |
| TEST_F(DefaultProfileTest, ConfigureService) { |
| unique_ptr<MockStore> storage(new MockStore()); |
| EXPECT_CALL(*storage, ContainsGroup(_)) |
| .WillRepeatedly(Return(false)); |
| EXPECT_CALL(*storage, Flush()) |
| .WillOnce(Return(true)); |
| |
| scoped_refptr<MockService> unknown_service(new MockService( |
| control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| EXPECT_CALL(*unknown_service, technology()) |
| .WillOnce(Return(Technology::kUnknown)); |
| EXPECT_CALL(*unknown_service, Save(_)) .Times(0); |
| |
| scoped_refptr<MockService> ethernet_service(new MockService( |
| control_interface(), |
| dispatcher(), |
| metrics(), |
| manager())); |
| EXPECT_CALL(*ethernet_service, technology()) |
| .WillOnce(Return(Technology::kEthernet)); |
| EXPECT_CALL(*ethernet_service, Save(storage.get())) |
| .WillOnce(Return(true)); |
| |
| profile_->set_storage(storage.release()); |
| EXPECT_FALSE(profile_->ConfigureService(unknown_service)); |
| EXPECT_TRUE(profile_->ConfigureService(ethernet_service)); |
| } |
| |
| TEST_F(DefaultProfileTest, UpdateDevice) { |
| unique_ptr<MockStore> storage(new MockStore()); |
| EXPECT_CALL(*storage, Flush()).WillOnce(Return(true)); |
| EXPECT_CALL(*device_, Save(storage.get())) |
| .WillOnce(Return(true)) |
| .WillOnce(Return(false)); |
| profile_->set_storage(storage.release()); |
| EXPECT_TRUE(profile_->UpdateDevice(device_)); |
| EXPECT_FALSE(profile_->UpdateDevice(device_)); |
| } |
| |
| #if !defined(DISABLE_WIFI) |
| TEST_F(DefaultProfileTest, UpdateWiFiProvider) { |
| MockWiFiProvider wifi_provider; |
| |
| { |
| unique_ptr<MockStore> storage(new MockStore()); |
| EXPECT_CALL(*storage, Flush()).Times(0); |
| EXPECT_CALL(wifi_provider, Save(storage.get())).WillOnce(Return(false)); |
| profile_->set_storage(storage.release()); |
| EXPECT_FALSE(profile_->UpdateWiFiProvider(wifi_provider)); |
| } |
| |
| { |
| unique_ptr<MockStore> storage(new MockStore()); |
| EXPECT_CALL(*storage, Flush()).WillOnce(Return(false)); |
| EXPECT_CALL(wifi_provider, Save(storage.get())).WillOnce(Return(true)); |
| profile_->set_storage(storage.release()); |
| EXPECT_FALSE(profile_->UpdateWiFiProvider(wifi_provider)); |
| } |
| |
| { |
| unique_ptr<MockStore> storage(new MockStore()); |
| EXPECT_CALL(*storage, Flush()).WillOnce(Return(true)); |
| EXPECT_CALL(wifi_provider, Save(storage.get())).WillOnce(Return(true)); |
| profile_->set_storage(storage.release()); |
| EXPECT_TRUE(profile_->UpdateWiFiProvider(wifi_provider)); |
| } |
| } |
| #endif // DISABLE_WIFI |
| |
| } // namespace shill |