Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium OS Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #include "shill/vpn_provider.h" |
| 6 | |
| 7 | #include <chromeos/dbus/service_constants.h> |
| 8 | #include <gtest/gtest.h> |
| 9 | |
| 10 | #include "shill/error.h" |
| 11 | #include "shill/nice_mock_control.h" |
| 12 | #include "shill/mock_adaptors.h" |
Darin Petkov | 79d74c9 | 2012-03-07 17:20:32 +0100 | [diff] [blame] | 13 | #include "shill/mock_device_info.h" |
Paul Stewart | ca6abd4 | 2012-03-01 15:45:29 -0800 | [diff] [blame] | 14 | #include "shill/mock_manager.h" |
Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 15 | #include "shill/mock_metrics.h" |
Paul Stewart | 6681533 | 2012-04-09 18:09:36 -0700 | [diff] [blame] | 16 | #include "shill/mock_profile.h" |
| 17 | #include "shill/mock_store.h" |
Paul Stewart | ca6abd4 | 2012-03-01 15:45:29 -0800 | [diff] [blame] | 18 | #include "shill/mock_vpn_driver.h" |
Paul Stewart | 65512e1 | 2012-03-26 18:01:08 -0700 | [diff] [blame] | 19 | #include "shill/mock_vpn_service.h" |
Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 20 | |
Paul Stewart | ca6abd4 | 2012-03-01 15:45:29 -0800 | [diff] [blame] | 21 | using std::string; |
| 22 | using testing::_; |
Paul Stewart | 6681533 | 2012-04-09 18:09:36 -0700 | [diff] [blame] | 23 | using testing::DoAll; |
| 24 | using testing::NiceMock; |
Paul Stewart | ca6abd4 | 2012-03-01 15:45:29 -0800 | [diff] [blame] | 25 | using testing::Return; |
Paul Stewart | 6681533 | 2012-04-09 18:09:36 -0700 | [diff] [blame] | 26 | using testing::SetArgumentPointee; |
Paul Stewart | ca6abd4 | 2012-03-01 15:45:29 -0800 | [diff] [blame] | 27 | |
Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 28 | namespace shill { |
| 29 | |
| 30 | class VPNProviderTest : public testing::Test { |
| 31 | public: |
| 32 | VPNProviderTest() |
Thieu Le | 6c1e3bb | 2013-02-06 15:20:35 -0800 | [diff] [blame] | 33 | : metrics_(NULL), |
| 34 | manager_(&control_, NULL, &metrics_, NULL), |
Darin Petkov | 79d74c9 | 2012-03-07 17:20:32 +0100 | [diff] [blame] | 35 | device_info_(&control_, NULL, &metrics_, &manager_), |
Paul Stewart | ca6abd4 | 2012-03-01 15:45:29 -0800 | [diff] [blame] | 36 | provider_(&control_, NULL, &metrics_, &manager_) {} |
Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 37 | |
| 38 | virtual ~VPNProviderTest() {} |
| 39 | |
| 40 | protected: |
Darin Petkov | 0286771 | 2012-03-12 14:25:05 +0100 | [diff] [blame] | 41 | static const char kHost[]; |
| 42 | static const char kName[]; |
| 43 | |
Darin Petkov | 457728b | 2013-01-09 09:49:08 +0100 | [diff] [blame] | 44 | string GetServiceFriendlyName(const ServiceRefPtr &service) { |
| 45 | return service->friendly_name(); |
| 46 | } |
| 47 | |
Darin Petkov | 4cbff5b | 2013-01-29 16:29:05 +0100 | [diff] [blame] | 48 | void SetConnectState(const ServiceRefPtr &service, |
| 49 | Service::ConnectState state) { |
| 50 | service->state_ = state; |
| 51 | } |
| 52 | |
| 53 | void AddService(const VPNServiceRefPtr &service) { |
| 54 | provider_.services_.push_back(service); |
| 55 | } |
| 56 | |
Darin Petkov | 9c6e981 | 2013-03-26 13:49:07 +0100 | [diff] [blame] | 57 | VPNServiceRefPtr GetServiceAt(int idx) { |
| 58 | return provider_.services_[idx]; |
| 59 | } |
| 60 | |
Paul Stewart | bc14fb7 | 2013-07-30 08:21:58 -0700 | [diff] [blame] | 61 | size_t GetServiceCount() const { |
| 62 | return provider_.services_.size(); |
| 63 | } |
| 64 | |
Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 65 | NiceMockControl control_; |
| 66 | MockMetrics metrics_; |
Paul Stewart | ca6abd4 | 2012-03-01 15:45:29 -0800 | [diff] [blame] | 67 | MockManager manager_; |
Darin Petkov | 79d74c9 | 2012-03-07 17:20:32 +0100 | [diff] [blame] | 68 | MockDeviceInfo device_info_; |
Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 69 | VPNProvider provider_; |
| 70 | }; |
| 71 | |
Darin Petkov | 0286771 | 2012-03-12 14:25:05 +0100 | [diff] [blame] | 72 | const char VPNProviderTest::kHost[] = "10.8.0.1"; |
| 73 | const char VPNProviderTest::kName[] = "vpn-name"; |
| 74 | |
| 75 | TEST_F(VPNProviderTest, GetServiceNoType) { |
Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 76 | KeyValueStore args; |
| 77 | Error e; |
| 78 | args.SetString(flimflam::kTypeProperty, flimflam::kTypeVPN); |
Paul Stewart | 0e51ad9 | 2013-07-26 14:42:55 -0700 | [diff] [blame] | 79 | ServiceRefPtr service = provider_.GetService(args, &e); |
Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 80 | EXPECT_EQ(Error::kNotSupported, e.type()); |
| 81 | EXPECT_FALSE(service); |
| 82 | } |
| 83 | |
Darin Petkov | 0286771 | 2012-03-12 14:25:05 +0100 | [diff] [blame] | 84 | TEST_F(VPNProviderTest, GetServiceUnsupportedType) { |
Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 85 | KeyValueStore args; |
| 86 | Error e; |
| 87 | args.SetString(flimflam::kTypeProperty, flimflam::kTypeVPN); |
| 88 | args.SetString(flimflam::kProviderTypeProperty, "unknown-vpn-type"); |
Darin Petkov | 0286771 | 2012-03-12 14:25:05 +0100 | [diff] [blame] | 89 | args.SetString(flimflam::kProviderHostProperty, kHost); |
Darin Petkov | 4e02ba2 | 2013-04-02 13:44:08 +0200 | [diff] [blame] | 90 | args.SetString(flimflam::kNameProperty, kName); |
Paul Stewart | 0e51ad9 | 2013-07-26 14:42:55 -0700 | [diff] [blame] | 91 | ServiceRefPtr service = provider_.GetService(args, &e); |
Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 92 | EXPECT_EQ(Error::kNotSupported, e.type()); |
| 93 | EXPECT_FALSE(service); |
| 94 | } |
| 95 | |
Darin Petkov | 0286771 | 2012-03-12 14:25:05 +0100 | [diff] [blame] | 96 | TEST_F(VPNProviderTest, GetService) { |
Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 97 | KeyValueStore args; |
Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 98 | args.SetString(flimflam::kTypeProperty, flimflam::kTypeVPN); |
| 99 | args.SetString(flimflam::kProviderTypeProperty, flimflam::kProviderOpenVpn); |
Darin Petkov | 0286771 | 2012-03-12 14:25:05 +0100 | [diff] [blame] | 100 | args.SetString(flimflam::kProviderHostProperty, kHost); |
Darin Petkov | 4e02ba2 | 2013-04-02 13:44:08 +0200 | [diff] [blame] | 101 | args.SetString(flimflam::kNameProperty, kName); |
Paul Stewart | bc14fb7 | 2013-07-30 08:21:58 -0700 | [diff] [blame] | 102 | |
| 103 | { |
| 104 | Error error; |
| 105 | ServiceRefPtr service = provider_.FindSimilarService(args, &error); |
| 106 | EXPECT_EQ(Error::kNotFound, error.type()); |
| 107 | EXPECT_EQ(NULL, service.get()); |
| 108 | } |
| 109 | |
| 110 | EXPECT_EQ(0, GetServiceCount()); |
| 111 | |
| 112 | ServiceRefPtr service; |
| 113 | { |
| 114 | Error error; |
| 115 | EXPECT_CALL(manager_, device_info()).WillOnce(Return(&device_info_)); |
| 116 | EXPECT_CALL(manager_, RegisterService(_)); |
| 117 | service = provider_.GetService(args, &error); |
| 118 | EXPECT_TRUE(error.IsSuccess()); |
| 119 | ASSERT_TRUE(service); |
| 120 | testing::Mock::VerifyAndClearExpectations(&manager_); |
| 121 | } |
| 122 | |
| 123 | EXPECT_EQ("vpn_10_8_0_1_vpn_name", service->GetStorageIdentifier()); |
| 124 | EXPECT_EQ(kName, GetServiceFriendlyName(service)); |
| 125 | |
| 126 | EXPECT_EQ(1, GetServiceCount()); |
Paul Stewart | 39964fa | 2012-04-04 09:50:25 -0700 | [diff] [blame] | 127 | |
Darin Petkov | 9c6e981 | 2013-03-26 13:49:07 +0100 | [diff] [blame] | 128 | // Configure the service to set its properties (including Provider.Host). |
Paul Stewart | bc14fb7 | 2013-07-30 08:21:58 -0700 | [diff] [blame] | 129 | { |
| 130 | Error error; |
| 131 | service->Configure(args, &error); |
| 132 | EXPECT_TRUE(error.IsSuccess()); |
| 133 | } |
| 134 | |
| 135 | // None of the calls below should cause a new service to be registered. |
| 136 | EXPECT_CALL(manager_, RegisterService(_)).Times(0); |
Darin Petkov | 9c6e981 | 2013-03-26 13:49:07 +0100 | [diff] [blame] | 137 | |
Paul Stewart | 39964fa | 2012-04-04 09:50:25 -0700 | [diff] [blame] | 138 | // A second call should return the same service. |
Paul Stewart | bc14fb7 | 2013-07-30 08:21:58 -0700 | [diff] [blame] | 139 | { |
| 140 | Error error; |
| 141 | ServiceRefPtr get_service = provider_.GetService(args, &error); |
| 142 | EXPECT_TRUE(error.IsSuccess()); |
| 143 | ASSERT_EQ(service, get_service); |
| 144 | } |
| 145 | |
| 146 | EXPECT_EQ(1, GetServiceCount()); |
| 147 | |
| 148 | // FindSimilarService should also return this service. |
| 149 | { |
| 150 | Error error; |
| 151 | ServiceRefPtr similar_service = provider_.FindSimilarService(args, &error); |
| 152 | EXPECT_TRUE(error.IsSuccess()); |
| 153 | EXPECT_EQ(service, similar_service); |
| 154 | } |
| 155 | |
| 156 | EXPECT_EQ(1, GetServiceCount()); |
| 157 | |
| 158 | // However, CreateTemporaryService should create a different service. |
| 159 | { |
| 160 | Error error; |
| 161 | ServiceRefPtr temporary_service = |
| 162 | provider_.CreateTemporaryService(args, &error); |
| 163 | EXPECT_TRUE(error.IsSuccess()); |
| 164 | EXPECT_NE(service, temporary_service); |
| 165 | |
| 166 | // However this service will not be part of the provider. |
| 167 | EXPECT_EQ(1, GetServiceCount()); |
| 168 | } |
Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 169 | } |
| 170 | |
Paul Stewart | ca6abd4 | 2012-03-01 15:45:29 -0800 | [diff] [blame] | 171 | TEST_F(VPNProviderTest, OnDeviceInfoAvailable) { |
| 172 | const string kInterfaceName("tun0"); |
| 173 | const int kInterfaceIndex = 1; |
| 174 | |
| 175 | scoped_ptr<MockVPNDriver> bad_driver(new MockVPNDriver()); |
| 176 | EXPECT_CALL(*bad_driver.get(), ClaimInterface(_, _)) |
| 177 | .Times(2) |
| 178 | .WillRepeatedly(Return(false)); |
| 179 | provider_.services_.push_back( |
| 180 | new VPNService(&control_, NULL, &metrics_, NULL, bad_driver.release())); |
| 181 | |
| 182 | EXPECT_FALSE(provider_.OnDeviceInfoAvailable(kInterfaceName, |
| 183 | kInterfaceIndex)); |
| 184 | |
| 185 | scoped_ptr<MockVPNDriver> good_driver(new MockVPNDriver()); |
| 186 | EXPECT_CALL(*good_driver.get(), ClaimInterface(_, _)) |
| 187 | .WillOnce(Return(true)); |
| 188 | provider_.services_.push_back( |
| 189 | new VPNService(&control_, NULL, &metrics_, NULL, good_driver.release())); |
| 190 | |
| 191 | scoped_ptr<MockVPNDriver> dup_driver(new MockVPNDriver()); |
| 192 | EXPECT_CALL(*dup_driver.get(), ClaimInterface(_, _)) |
| 193 | .Times(0); |
| 194 | provider_.services_.push_back( |
| 195 | new VPNService(&control_, NULL, &metrics_, NULL, dup_driver.release())); |
| 196 | |
| 197 | EXPECT_TRUE(provider_.OnDeviceInfoAvailable(kInterfaceName, kInterfaceIndex)); |
| 198 | provider_.services_.clear(); |
| 199 | } |
| 200 | |
Paul Stewart | 65512e1 | 2012-03-26 18:01:08 -0700 | [diff] [blame] | 201 | TEST_F(VPNProviderTest, RemoveService) { |
| 202 | scoped_refptr<MockVPNService> service0( |
| 203 | new MockVPNService(&control_, NULL, &metrics_, NULL, NULL)); |
| 204 | scoped_refptr<MockVPNService> service1( |
| 205 | new MockVPNService(&control_, NULL, &metrics_, NULL, NULL)); |
| 206 | scoped_refptr<MockVPNService> service2( |
| 207 | new MockVPNService(&control_, NULL, &metrics_, NULL, NULL)); |
| 208 | |
| 209 | provider_.services_.push_back(service0.get()); |
| 210 | provider_.services_.push_back(service1.get()); |
| 211 | provider_.services_.push_back(service2.get()); |
| 212 | |
| 213 | ASSERT_EQ(3, provider_.services_.size()); |
| 214 | |
| 215 | provider_.RemoveService(service1); |
| 216 | |
| 217 | EXPECT_EQ(2, provider_.services_.size()); |
| 218 | EXPECT_EQ(service0, provider_.services_[0]); |
| 219 | EXPECT_EQ(service2, provider_.services_[1]); |
| 220 | |
| 221 | provider_.RemoveService(service2); |
| 222 | |
| 223 | EXPECT_EQ(1, provider_.services_.size()); |
| 224 | EXPECT_EQ(service0, provider_.services_[0]); |
| 225 | |
| 226 | provider_.RemoveService(service0); |
| 227 | EXPECT_EQ(0, provider_.services_.size()); |
| 228 | } |
| 229 | |
Paul Stewart | 6681533 | 2012-04-09 18:09:36 -0700 | [diff] [blame] | 230 | MATCHER_P(ServiceWithStorageId, storage_id, "") { |
| 231 | return arg->GetStorageIdentifier() == storage_id; |
| 232 | } |
| 233 | |
| 234 | TEST_F(VPNProviderTest, CreateServicesFromProfile) { |
| 235 | scoped_refptr<MockProfile> profile( |
Thieu Le | 5133b71 | 2013-02-19 14:47:21 -0800 | [diff] [blame] | 236 | new NiceMock<MockProfile>(&control_, &metrics_, &manager_, "")); |
Paul Stewart | 6681533 | 2012-04-09 18:09:36 -0700 | [diff] [blame] | 237 | NiceMock<MockStore> storage; |
Darin Petkov | 9c6e981 | 2013-03-26 13:49:07 +0100 | [diff] [blame] | 238 | EXPECT_CALL(*profile, GetConstStorage()).WillRepeatedly(Return(&storage)); |
| 239 | EXPECT_CALL(storage, GetString(_, _, _)).WillRepeatedly(Return(false)); |
Paul Stewart | 6681533 | 2012-04-09 18:09:36 -0700 | [diff] [blame] | 240 | |
| 241 | std::set<string> groups; |
Darin Petkov | 9c6e981 | 2013-03-26 13:49:07 +0100 | [diff] [blame] | 242 | |
| 243 | const string kNonVPNIdentifier("foo_1"); |
Paul Stewart | 6681533 | 2012-04-09 18:09:36 -0700 | [diff] [blame] | 244 | groups.insert(kNonVPNIdentifier); |
Darin Petkov | 9c6e981 | 2013-03-26 13:49:07 +0100 | [diff] [blame] | 245 | |
| 246 | const string kVPNIdentifierNoProvider("vpn_no_provider"); |
| 247 | groups.insert(kVPNIdentifierNoProvider); |
| 248 | |
| 249 | const string kVPNIdentifierNoName("vpn_no_name"); |
| 250 | groups.insert(kVPNIdentifierNoName); |
| 251 | const string kOpenVPNProvider(flimflam::kProviderOpenVpn); |
| 252 | EXPECT_CALL(storage, GetString(kVPNIdentifierNoName, |
| 253 | flimflam::kProviderTypeProperty, |
| 254 | _)) |
| 255 | .WillRepeatedly(DoAll(SetArgumentPointee<2>(kOpenVPNProvider), |
| 256 | Return(true))); |
| 257 | |
| 258 | const string kVPNIdentifierNoHost("vpn_no_host"); |
| 259 | groups.insert(kVPNIdentifierNoHost); |
| 260 | EXPECT_CALL(storage, GetString(kVPNIdentifierNoHost, |
| 261 | flimflam::kProviderTypeProperty, |
| 262 | _)) |
| 263 | .WillRepeatedly(DoAll(SetArgumentPointee<2>(kOpenVPNProvider), |
| 264 | Return(true))); |
| 265 | const string kName("name"); |
| 266 | EXPECT_CALL(storage, GetString(kVPNIdentifierNoHost, |
| 267 | flimflam::kNameProperty, _)) |
| 268 | .WillRepeatedly(DoAll(SetArgumentPointee<2>(kName), Return(true))); |
| 269 | |
| 270 | const string kVPNIdentifierValid("vpn_valid"); |
| 271 | groups.insert(kVPNIdentifierValid); |
| 272 | EXPECT_CALL(storage, GetString(kVPNIdentifierValid, |
| 273 | flimflam::kProviderTypeProperty, |
| 274 | _)) |
| 275 | .WillRepeatedly(DoAll(SetArgumentPointee<2>(kOpenVPNProvider), |
| 276 | Return(true))); |
| 277 | EXPECT_CALL(storage, GetString(kVPNIdentifierValid, |
| 278 | flimflam::kNameProperty, _)) |
| 279 | .WillRepeatedly(DoAll(SetArgumentPointee<2>(kName), Return(true))); |
| 280 | const string kHost("1.2.3.4"); |
| 281 | EXPECT_CALL(storage, GetString(kVPNIdentifierValid, |
| 282 | flimflam::kProviderHostProperty, _)) |
| 283 | .WillRepeatedly(DoAll(SetArgumentPointee<2>(kHost), Return(true))); |
| 284 | |
Paul Stewart | 6681533 | 2012-04-09 18:09:36 -0700 | [diff] [blame] | 285 | EXPECT_CALL(storage, GetGroupsWithKey(flimflam::kProviderTypeProperty)) |
| 286 | .WillRepeatedly(Return(groups)); |
| 287 | |
Paul Stewart | 6681533 | 2012-04-09 18:09:36 -0700 | [diff] [blame] | 288 | EXPECT_CALL(manager_, device_info()) |
| 289 | .WillRepeatedly(Return(reinterpret_cast<DeviceInfo *>(NULL))); |
Darin Petkov | 9c6e981 | 2013-03-26 13:49:07 +0100 | [diff] [blame] | 290 | EXPECT_CALL(manager_, |
| 291 | RegisterService(ServiceWithStorageId(kVPNIdentifierValid))); |
| 292 | EXPECT_CALL(*profile, |
| 293 | ConfigureService(ServiceWithStorageId(kVPNIdentifierValid))) |
| 294 | .WillOnce(Return(true)); |
Paul Stewart | 6681533 | 2012-04-09 18:09:36 -0700 | [diff] [blame] | 295 | provider_.CreateServicesFromProfile(profile); |
| 296 | |
Darin Petkov | 9c6e981 | 2013-03-26 13:49:07 +0100 | [diff] [blame] | 297 | GetServiceAt(0)->driver()->args()->SetString(flimflam::kProviderHostProperty, |
| 298 | kHost); |
Paul Stewart | 6681533 | 2012-04-09 18:09:36 -0700 | [diff] [blame] | 299 | // Calling this again should not create any more services (checked by the |
| 300 | // Times(1) above). |
| 301 | provider_.CreateServicesFromProfile(profile); |
| 302 | } |
| 303 | |
Darin Petkov | 9d1bbe7 | 2012-04-25 10:58:59 +0200 | [diff] [blame] | 304 | TEST_F(VPNProviderTest, CreateService) { |
| 305 | static const char kName[] = "test-vpn-service"; |
| 306 | static const char kStorageID[] = "test_vpn_storage_id"; |
| 307 | static const char *kTypes[] = { |
| 308 | flimflam::kProviderOpenVpn, |
| 309 | flimflam::kProviderL2tpIpsec, |
| 310 | }; |
| 311 | const size_t kTypesCount = arraysize(kTypes); |
| 312 | EXPECT_CALL(manager_, device_info()) |
| 313 | .Times(kTypesCount) |
| 314 | .WillRepeatedly(Return(&device_info_)); |
| 315 | EXPECT_CALL(manager_, RegisterService(_)).Times(kTypesCount); |
| 316 | for (size_t i = 0; i < kTypesCount; i++) { |
| 317 | Error error; |
| 318 | VPNServiceRefPtr service = |
| 319 | provider_.CreateService(kTypes[i], kName, kStorageID, &error); |
| 320 | ASSERT_TRUE(service) << kTypes[i]; |
| 321 | ASSERT_TRUE(service->driver()) << kTypes[i]; |
| 322 | EXPECT_EQ(kTypes[i], service->driver()->GetProviderType()); |
Darin Petkov | 457728b | 2013-01-09 09:49:08 +0100 | [diff] [blame] | 323 | EXPECT_EQ(kName, GetServiceFriendlyName(service)) << kTypes[i]; |
Darin Petkov | 9d1bbe7 | 2012-04-25 10:58:59 +0200 | [diff] [blame] | 324 | EXPECT_EQ(kStorageID, service->GetStorageIdentifier()) << kTypes[i]; |
| 325 | EXPECT_TRUE(error.IsSuccess()) << kTypes[i]; |
| 326 | } |
| 327 | Error error; |
| 328 | VPNServiceRefPtr unknown_service = |
| 329 | provider_.CreateService("unknown-vpn-type", kName, kStorageID, &error); |
| 330 | EXPECT_FALSE(unknown_service); |
| 331 | EXPECT_EQ(Error::kNotSupported, error.type()); |
| 332 | } |
| 333 | |
Darin Petkov | 4cbff5b | 2013-01-29 16:29:05 +0100 | [diff] [blame] | 334 | TEST_F(VPNProviderTest, HasActiveService) { |
| 335 | EXPECT_FALSE(provider_.HasActiveService()); |
| 336 | |
| 337 | scoped_refptr<MockVPNService> service0( |
| 338 | new MockVPNService(&control_, NULL, &metrics_, NULL, NULL)); |
| 339 | scoped_refptr<MockVPNService> service1( |
| 340 | new MockVPNService(&control_, NULL, &metrics_, NULL, NULL)); |
| 341 | scoped_refptr<MockVPNService> service2( |
| 342 | new MockVPNService(&control_, NULL, &metrics_, NULL, NULL)); |
| 343 | |
| 344 | AddService(service0); |
| 345 | AddService(service1); |
| 346 | AddService(service2); |
| 347 | EXPECT_FALSE(provider_.HasActiveService()); |
| 348 | |
| 349 | SetConnectState(service1, Service::kStateAssociating); |
| 350 | EXPECT_TRUE(provider_.HasActiveService()); |
| 351 | |
| 352 | SetConnectState(service1, Service::kStateOnline); |
| 353 | EXPECT_TRUE(provider_.HasActiveService()); |
| 354 | } |
| 355 | |
Darin Petkov | 33af05c | 2012-02-28 10:10:30 +0100 | [diff] [blame] | 356 | } // namespace shill |