blob: db6ca2976fe7f367dcf7acc239fdb6ec2e97a1a8 [file] [log] [blame]
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -08001// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Darin Petkove7cb7f82011-06-03 13:21:51 -07002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
Chris Masone8a7b8be2011-07-22 12:43:37 -07005#include "shill/dhcp_config.h"
6
Eric Shienbrood3e20a232012-02-16 11:35:56 -05007#include <base/bind.h>
Darin Petkov92c43902011-06-09 20:46:06 -07008#include <base/file_util.h>
Eric Shienbrood3e20a232012-02-16 11:35:56 -05009#include <base/scoped_temp_dir.h>
Darin Petkov92c43902011-06-09 20:46:06 -070010#include <base/stringprintf.h>
Chris Masone43b48a12011-07-01 13:37:07 -070011#include <chromeos/dbus/service_constants.h>
Chris Masone8a7b8be2011-07-22 12:43:37 -070012#include <gtest/gtest.h>
Darin Petkov92c43902011-06-09 20:46:06 -070013
Chris Masone43b48a12011-07-01 13:37:07 -070014#include "shill/dbus_adaptor.h"
Darin Petkovf7897bc2011-06-08 17:13:36 -070015#include "shill/dhcp_provider.h"
Paul Stewart26b327e2011-10-19 11:38:09 -070016#include "shill/event_dispatcher.h"
Chris Masone19e30402011-07-19 15:48:47 -070017#include "shill/mock_control.h"
Darin Petkov98dd6a02011-06-10 15:12:57 -070018#include "shill/mock_dhcp_proxy.h"
Darin Petkovf7897bc2011-06-08 17:13:36 -070019#include "shill/mock_glib.h"
Chris Masone43b48a12011-07-01 13:37:07 -070020#include "shill/property_store_unittest.h"
Darin Petkova7b89492011-07-27 12:48:17 -070021#include "shill/proxy_factory.h"
Darin Petkove7cb7f82011-06-03 13:21:51 -070022
Eric Shienbrood3e20a232012-02-16 11:35:56 -050023using base::Bind;
24using base::Unretained;
Darin Petkove7cb7f82011-06-03 13:21:51 -070025using std::string;
26using std::vector;
Darin Petkovf7897bc2011-06-08 17:13:36 -070027using testing::_;
28using testing::Return;
29using testing::SetArgumentPointee;
Darin Petkove7cb7f82011-06-03 13:21:51 -070030using testing::Test;
31
32namespace shill {
33
Darin Petkov92c43902011-06-09 20:46:06 -070034namespace {
Darin Petkova7b89492011-07-27 12:48:17 -070035const char kDeviceName[] = "eth0";
Paul Stewartd32f4842012-01-11 16:08:13 -080036const char kHostName[] = "hostname";
Darin Petkov92c43902011-06-09 20:46:06 -070037} // namespace {}
38
Chris Masone43b48a12011-07-01 13:37:07 -070039class DHCPConfigTest : public PropertyStoreTest {
Darin Petkove7cb7f82011-06-03 13:21:51 -070040 public:
Darin Petkovf7897bc2011-06-08 17:13:36 -070041 DHCPConfigTest()
Darin Petkovf65e9282011-06-21 14:29:56 -070042 : proxy_(new MockDHCPProxy()),
Darin Petkova7b89492011-07-27 12:48:17 -070043 proxy_factory_(this),
Chris Masone19e30402011-07-19 15:48:47 -070044 config_(new DHCPConfig(&control_,
Chris Masone2176a882011-09-14 22:29:15 -070045 dispatcher(),
Chris Masone19e30402011-07-19 15:48:47 -070046 DHCPProvider::GetInstance(),
Darin Petkov92c43902011-06-09 20:46:06 -070047 kDeviceName,
Paul Stewartd32f4842012-01-11 16:08:13 -080048 kHostName,
Chris Masone2176a882011-09-14 22:29:15 -070049 glib())) {}
Darin Petkova7b89492011-07-27 12:48:17 -070050
51 virtual void SetUp() {
Darin Petkovab565bb2011-10-06 02:55:51 -070052 config_->proxy_factory_ = &proxy_factory_;
Darin Petkova7b89492011-07-27 12:48:17 -070053 }
54
55 virtual void TearDown() {
Darin Petkovab565bb2011-10-06 02:55:51 -070056 config_->proxy_factory_ = NULL;
Darin Petkov98dd6a02011-06-10 15:12:57 -070057 }
Darin Petkove7cb7f82011-06-03 13:21:51 -070058
59 protected:
Darin Petkova7b89492011-07-27 12:48:17 -070060 class TestProxyFactory : public ProxyFactory {
61 public:
Paul Stewart7355ce12011-09-02 10:47:01 -070062 explicit TestProxyFactory(DHCPConfigTest *test) : test_(test) {}
Darin Petkova7b89492011-07-27 12:48:17 -070063
mukesh agrawal1830fa12011-09-26 14:31:40 -070064 virtual DHCPProxyInterface *CreateDHCPProxy(const string &/*service*/) {
Darin Petkova7b89492011-07-27 12:48:17 -070065 return test_->proxy_.release();
66 }
67
68 private:
69 DHCPConfigTest *test_;
70 };
71
Darin Petkova7b89492011-07-27 12:48:17 -070072 scoped_ptr<MockDHCPProxy> proxy_;
73 TestProxyFactory proxy_factory_;
Chris Masone19e30402011-07-19 15:48:47 -070074 MockControl control_;
Darin Petkovf7897bc2011-06-08 17:13:36 -070075 DHCPConfigRefPtr config_;
Darin Petkove7cb7f82011-06-03 13:21:51 -070076};
77
78TEST_F(DHCPConfigTest, GetIPv4AddressString) {
Darin Petkovf7897bc2011-06-08 17:13:36 -070079 EXPECT_EQ("255.255.255.255", config_->GetIPv4AddressString(0xffffffff));
80 EXPECT_EQ("0.0.0.0", config_->GetIPv4AddressString(0));
81 EXPECT_EQ("1.2.3.4", config_->GetIPv4AddressString(0x04030201));
Darin Petkove7cb7f82011-06-03 13:21:51 -070082}
83
Darin Petkova7b89492011-07-27 12:48:17 -070084TEST_F(DHCPConfigTest, InitProxy) {
85 static const char kService[] = ":1.200";
Darin Petkova7b89492011-07-27 12:48:17 -070086 config_->InitProxy(kService);
Darin Petkova7b89492011-07-27 12:48:17 -070087
88 EXPECT_TRUE(proxy_.get());
89 EXPECT_FALSE(config_->proxy_.get());
Chris Masone2176a882011-09-14 22:29:15 -070090 dispatcher()->DispatchPendingEvents();
Darin Petkova7b89492011-07-27 12:48:17 -070091 EXPECT_FALSE(proxy_.get());
92 EXPECT_TRUE(config_->proxy_.get());
93
94 config_->InitProxy(kService);
Darin Petkova7b89492011-07-27 12:48:17 -070095}
96
Darin Petkove7cb7f82011-06-03 13:21:51 -070097TEST_F(DHCPConfigTest, ParseConfiguration) {
98 DHCPConfig::Configuration conf;
99 conf[DHCPConfig::kConfigurationKeyIPAddress].writer().append_uint32(
100 0x01020304);
101 conf[DHCPConfig::kConfigurationKeySubnetCIDR].writer().append_byte(
102 16);
103 conf[DHCPConfig::kConfigurationKeyBroadcastAddress].writer().append_uint32(
104 0x10203040);
105 {
Darin Petkove7cb7f82011-06-03 13:21:51 -0700106 vector<unsigned int> routers;
107 routers.push_back(0x02040608);
108 routers.push_back(0x03050709);
Darin Petkovf7897bc2011-06-08 17:13:36 -0700109 DBus::MessageIter writer =
110 conf[DHCPConfig::kConfigurationKeyRouters].writer();
Darin Petkove7cb7f82011-06-03 13:21:51 -0700111 writer << routers;
Darin Petkove7cb7f82011-06-03 13:21:51 -0700112 }
113 {
Darin Petkove7cb7f82011-06-03 13:21:51 -0700114 vector<unsigned int> dns;
115 dns.push_back(0x09070503);
116 dns.push_back(0x08060402);
Darin Petkovf7897bc2011-06-08 17:13:36 -0700117 DBus::MessageIter writer = conf[DHCPConfig::kConfigurationKeyDNS].writer();
Darin Petkove7cb7f82011-06-03 13:21:51 -0700118 writer << dns;
Darin Petkove7cb7f82011-06-03 13:21:51 -0700119 }
120 conf[DHCPConfig::kConfigurationKeyDomainName].writer().append_string(
121 "domain-name");
122 {
Darin Petkove7cb7f82011-06-03 13:21:51 -0700123 vector<string> search;
124 search.push_back("foo.com");
125 search.push_back("bar.com");
Darin Petkovf7897bc2011-06-08 17:13:36 -0700126 DBus::MessageIter writer =
127 conf[DHCPConfig::kConfigurationKeyDomainSearch].writer();
Darin Petkove7cb7f82011-06-03 13:21:51 -0700128 writer << search;
Darin Petkove7cb7f82011-06-03 13:21:51 -0700129 }
130 conf[DHCPConfig::kConfigurationKeyMTU].writer().append_uint16(600);
131 conf["UnknownKey"] = DBus::Variant();
132
Darin Petkove7cb7f82011-06-03 13:21:51 -0700133 IPConfig::Properties properties;
Darin Petkovf7897bc2011-06-08 17:13:36 -0700134 ASSERT_TRUE(config_->ParseConfiguration(conf, &properties));
Darin Petkove7cb7f82011-06-03 13:21:51 -0700135 EXPECT_EQ("4.3.2.1", properties.address);
Paul Stewart48100b02012-03-19 07:53:52 -0700136 EXPECT_EQ(16, properties.subnet_prefix);
Darin Petkove7cb7f82011-06-03 13:21:51 -0700137 EXPECT_EQ("64.48.32.16", properties.broadcast_address);
138 EXPECT_EQ("8.6.4.2", properties.gateway);
139 ASSERT_EQ(2, properties.dns_servers.size());
140 EXPECT_EQ("3.5.7.9", properties.dns_servers[0]);
141 EXPECT_EQ("2.4.6.8", properties.dns_servers[1]);
142 EXPECT_EQ("domain-name", properties.domain_name);
143 ASSERT_EQ(2, properties.domain_search.size());
144 EXPECT_EQ("foo.com", properties.domain_search[0]);
145 EXPECT_EQ("bar.com", properties.domain_search[1]);
146 EXPECT_EQ(600, properties.mtu);
147}
148
Darin Petkov92c43902011-06-09 20:46:06 -0700149TEST_F(DHCPConfigTest, StartFail) {
Chris Masone2176a882011-09-14 22:29:15 -0700150 EXPECT_CALL(*glib(), SpawnAsync(_, _, _, _, _, _, _, _))
Darin Petkovf7897bc2011-06-08 17:13:36 -0700151 .WillOnce(Return(false));
Chris Masone2176a882011-09-14 22:29:15 -0700152 EXPECT_CALL(*glib(), ChildWatchAdd(_, _, _)).Times(0);
Darin Petkovf7897bc2011-06-08 17:13:36 -0700153 EXPECT_FALSE(config_->Start());
154 EXPECT_EQ(0, config_->pid_);
Darin Petkov92c43902011-06-09 20:46:06 -0700155}
Darin Petkovf7897bc2011-06-08 17:13:36 -0700156
Paul Stewartd32f4842012-01-11 16:08:13 -0800157MATCHER_P(IsDHCPCDArgs, has_hostname, "") {
158 if (string(arg[0]) != "/sbin/dhcpcd" ||
159 string(arg[1]) != "-B" ||
160 string(arg[2]) != kDeviceName) {
161 return false;
162 }
163
164 if (has_hostname) {
165 if (string(arg[3]) != "-h" ||
166 string(arg[4]) != kHostName ||
167 arg[5] != NULL) {
168 return false;
169 }
170 } else {
171 if (arg[3] != NULL) {
172 return false;
173 }
174 }
175
176 return true;
177}
178
179TEST_F(DHCPConfigTest, StartWithHostname) {
180 EXPECT_CALL(*glib(), SpawnAsync(_, IsDHCPCDArgs(true), _, _, _, _, _, _))
181 .WillOnce(Return(false));
182 EXPECT_FALSE(config_->Start());
183}
184
185TEST_F(DHCPConfigTest, StartWithoutHostname) {
186 DHCPConfigRefPtr config(new DHCPConfig(&control_,
187 dispatcher(),
188 DHCPProvider::GetInstance(),
189 kDeviceName,
190 "",
191 glib()));
192
193 EXPECT_CALL(*glib(), SpawnAsync(_, IsDHCPCDArgs(false), _, _, _, _, _, _))
194 .WillOnce(Return(false));
195 EXPECT_FALSE(config->Start());
196}
197
Darin Petkovf9b0ca82011-06-20 12:10:23 -0700198namespace {
199
200class UpdateCallbackTest {
201 public:
202 UpdateCallbackTest(const string &message,
Chris Masone2b105542011-06-22 10:58:09 -0700203 const IPConfigRefPtr &ipconfig,
Darin Petkovf9b0ca82011-06-20 12:10:23 -0700204 bool success)
205 : message_(message),
206 ipconfig_(ipconfig),
207 success_(success),
208 called_(false) {}
209
Chris Masone2b105542011-06-22 10:58:09 -0700210 void Callback(const IPConfigRefPtr &ipconfig, bool success) {
Darin Petkovf9b0ca82011-06-20 12:10:23 -0700211 called_ = true;
212 EXPECT_EQ(ipconfig_.get(), ipconfig.get()) << message_;
213 EXPECT_EQ(success_, success) << message_;
214 }
215
216 bool called() const { return called_; }
217
218 private:
219 const string message_;
220 IPConfigRefPtr ipconfig_;
221 bool success_;
222 bool called_;
223};
224
225} // namespace {}
226
227TEST_F(DHCPConfigTest, ProcessEventSignalFail) {
228 DHCPConfig::Configuration conf;
229 conf[DHCPConfig::kConfigurationKeyIPAddress].writer().append_uint32(
230 0x01020304);
231 UpdateCallbackTest callback_test(DHCPConfig::kReasonFail, config_, false);
232 config_->RegisterUpdateCallback(
Eric Shienbrood3e20a232012-02-16 11:35:56 -0500233 Bind(&UpdateCallbackTest::Callback, Unretained(&callback_test)));
Darin Petkovf9b0ca82011-06-20 12:10:23 -0700234 config_->ProcessEventSignal(DHCPConfig::kReasonFail, conf);
235 EXPECT_TRUE(callback_test.called());
236 EXPECT_TRUE(config_->properties().address.empty());
237}
238
239TEST_F(DHCPConfigTest, ProcessEventSignalSuccess) {
240 static const char * const kReasons[] = {
241 DHCPConfig::kReasonBound,
242 DHCPConfig::kReasonRebind,
243 DHCPConfig::kReasonReboot,
244 DHCPConfig::kReasonRenew
245 };
246 for (size_t r = 0; r < arraysize(kReasons); r++) {
247 DHCPConfig::Configuration conf;
248 string message = string(kReasons[r]) + " failed";
249 conf[DHCPConfig::kConfigurationKeyIPAddress].writer().append_uint32(r);
250 UpdateCallbackTest callback_test(message, config_, true);
251 config_->RegisterUpdateCallback(
Eric Shienbrood3e20a232012-02-16 11:35:56 -0500252 Bind(&UpdateCallbackTest::Callback, Unretained(&callback_test)));
Darin Petkovf9b0ca82011-06-20 12:10:23 -0700253 config_->ProcessEventSignal(kReasons[r], conf);
254 EXPECT_TRUE(callback_test.called()) << message;
Paul Stewart83224402011-11-30 14:52:30 -0800255 EXPECT_EQ(base::StringPrintf("%zu.0.0.0", r), config_->properties().address)
Darin Petkovf9b0ca82011-06-20 12:10:23 -0700256 << message;
257 }
258}
259
260TEST_F(DHCPConfigTest, ProcessEventSignalUnknown) {
261 DHCPConfig::Configuration conf;
262 conf[DHCPConfig::kConfigurationKeyIPAddress].writer().append_uint32(
263 0x01020304);
264 static const char kReasonUnknown[] = "UNKNOWN_REASON";
265 UpdateCallbackTest callback_test(kReasonUnknown, config_, false);
266 config_->RegisterUpdateCallback(
Eric Shienbrood3e20a232012-02-16 11:35:56 -0500267 Bind(&UpdateCallbackTest::Callback, Unretained(&callback_test)));
Darin Petkovf9b0ca82011-06-20 12:10:23 -0700268 config_->ProcessEventSignal(kReasonUnknown, conf);
269 EXPECT_FALSE(callback_test.called());
270 EXPECT_TRUE(config_->properties().address.empty());
271}
272
273
Darin Petkov98dd6a02011-06-10 15:12:57 -0700274TEST_F(DHCPConfigTest, ReleaseIP) {
275 config_->pid_ = 1 << 18; // Ensure unknown positive PID.
Darin Petkovaceede32011-07-18 15:32:38 -0700276 EXPECT_CALL(*proxy_, Release(kDeviceName)).Times(1);
Darin Petkova7b89492011-07-27 12:48:17 -0700277 config_->proxy_.reset(proxy_.release());
Darin Petkov98dd6a02011-06-10 15:12:57 -0700278 EXPECT_TRUE(config_->ReleaseIP());
279 config_->pid_ = 0;
280}
281
282TEST_F(DHCPConfigTest, RenewIP) {
283 config_->pid_ = 456;
Darin Petkovaceede32011-07-18 15:32:38 -0700284 EXPECT_CALL(*proxy_, Rebind(kDeviceName)).Times(1);
Darin Petkova7b89492011-07-27 12:48:17 -0700285 config_->proxy_.reset(proxy_.release());
Darin Petkov98dd6a02011-06-10 15:12:57 -0700286 EXPECT_TRUE(config_->RenewIP());
287 config_->pid_ = 0;
288}
289
290TEST_F(DHCPConfigTest, RequestIP) {
291 config_->pid_ = 567;
Darin Petkovaceede32011-07-18 15:32:38 -0700292 EXPECT_CALL(*proxy_, Rebind(kDeviceName)).Times(1);
Darin Petkova7b89492011-07-27 12:48:17 -0700293 config_->proxy_.reset(proxy_.release());
Darin Petkov98dd6a02011-06-10 15:12:57 -0700294 EXPECT_TRUE(config_->RenewIP());
295 config_->pid_ = 0;
296}
297
298TEST_F(DHCPConfigTest, Restart) {
299 const int kPID1 = 1 << 17; // Ensure unknown positive PID.
300 const int kPID2 = 987;
301 const unsigned int kTag1 = 11;
302 const unsigned int kTag2 = 22;
303 config_->pid_ = kPID1;
304 config_->child_watch_tag_ = kTag1;
305 DHCPProvider::GetInstance()->BindPID(kPID1, config_);
Chris Masone2176a882011-09-14 22:29:15 -0700306 EXPECT_CALL(*glib(), SourceRemove(kTag1)).WillOnce(Return(true));
307 EXPECT_CALL(*glib(), SpawnClosePID(kPID1)).Times(1);
308 EXPECT_CALL(*glib(), SpawnAsync(_, _, _, _, _, _, _, _))
Darin Petkov98dd6a02011-06-10 15:12:57 -0700309 .WillOnce(DoAll(SetArgumentPointee<6>(kPID2), Return(true)));
Chris Masone2176a882011-09-14 22:29:15 -0700310 EXPECT_CALL(*glib(), ChildWatchAdd(kPID2, _, _)).WillOnce(Return(kTag2));
Darin Petkov98dd6a02011-06-10 15:12:57 -0700311 EXPECT_TRUE(config_->Restart());
312 EXPECT_EQ(kPID2, config_->pid_);
313 EXPECT_EQ(config_.get(), DHCPProvider::GetInstance()->GetConfig(kPID2).get());
314 EXPECT_EQ(kTag2, config_->child_watch_tag_);
315 DHCPProvider::GetInstance()->UnbindPID(kPID2);
316 config_->pid_ = 0;
317 config_->child_watch_tag_ = 0;
318}
319
320TEST_F(DHCPConfigTest, RestartNoClient) {
321 const int kPID = 777;
322 const unsigned int kTag = 66;
Chris Masone2176a882011-09-14 22:29:15 -0700323 EXPECT_CALL(*glib(), SourceRemove(_)).Times(0);
324 EXPECT_CALL(*glib(), SpawnClosePID(_)).Times(0);
325 EXPECT_CALL(*glib(), SpawnAsync(_, _, _, _, _, _, _, _))
Darin Petkov98dd6a02011-06-10 15:12:57 -0700326 .WillOnce(DoAll(SetArgumentPointee<6>(kPID), Return(true)));
Chris Masone2176a882011-09-14 22:29:15 -0700327 EXPECT_CALL(*glib(), ChildWatchAdd(kPID, _, _)).WillOnce(Return(kTag));
Darin Petkov98dd6a02011-06-10 15:12:57 -0700328 EXPECT_TRUE(config_->Restart());
329 EXPECT_EQ(kPID, config_->pid_);
330 EXPECT_EQ(config_.get(), DHCPProvider::GetInstance()->GetConfig(kPID).get());
331 EXPECT_EQ(kTag, config_->child_watch_tag_);
332 DHCPProvider::GetInstance()->UnbindPID(kPID);
333 config_->pid_ = 0;
334 config_->child_watch_tag_ = 0;
335}
336
Darin Petkov92c43902011-06-09 20:46:06 -0700337TEST_F(DHCPConfigTest, StartSuccess) {
338 const int kPID = 123456;
339 const unsigned int kTag = 55;
Chris Masone2176a882011-09-14 22:29:15 -0700340 EXPECT_CALL(*glib(), SpawnAsync(_, _, _, _, _, _, _, _))
Darin Petkovf7897bc2011-06-08 17:13:36 -0700341 .WillOnce(DoAll(SetArgumentPointee<6>(kPID), Return(true)));
Chris Masone2176a882011-09-14 22:29:15 -0700342 EXPECT_CALL(*glib(), ChildWatchAdd(kPID, _, _)).WillOnce(Return(kTag));
Darin Petkovf7897bc2011-06-08 17:13:36 -0700343 EXPECT_TRUE(config_->Start());
344 EXPECT_EQ(kPID, config_->pid_);
Darin Petkov98dd6a02011-06-10 15:12:57 -0700345 EXPECT_EQ(config_.get(), DHCPProvider::GetInstance()->GetConfig(kPID).get());
346 EXPECT_EQ(kTag, config_->child_watch_tag_);
Darin Petkov92c43902011-06-09 20:46:06 -0700347
348 ScopedTempDir temp_dir;
349 config_->root_ = temp_dir.path();
350 FilePath varrun = temp_dir.path().Append("var/run");
351 EXPECT_TRUE(file_util::CreateDirectory(varrun));
352 FilePath pid_file =
353 varrun.Append(base::StringPrintf("dhcpcd-%s.pid", kDeviceName));
354 FilePath lease_file =
355 varrun.Append(base::StringPrintf("dhcpcd-%s.lease", kDeviceName));
356 EXPECT_EQ(0, file_util::WriteFile(pid_file, "", 0));
357 EXPECT_EQ(0, file_util::WriteFile(lease_file, "", 0));
358 ASSERT_TRUE(file_util::PathExists(pid_file));
359 ASSERT_TRUE(file_util::PathExists(lease_file));
360
Chris Masone2176a882011-09-14 22:29:15 -0700361 EXPECT_CALL(*glib(), SpawnClosePID(kPID)).Times(1);
Darin Petkov92c43902011-06-09 20:46:06 -0700362 DHCPConfig::ChildWatchCallback(kPID, 0, config_.get());
Darin Petkov98dd6a02011-06-10 15:12:57 -0700363 EXPECT_EQ(NULL, DHCPProvider::GetInstance()->GetConfig(kPID).get());
Darin Petkov92c43902011-06-09 20:46:06 -0700364 EXPECT_FALSE(file_util::PathExists(pid_file));
365 EXPECT_FALSE(file_util::PathExists(lease_file));
Darin Petkovf7897bc2011-06-08 17:13:36 -0700366}
367
Darin Petkov98dd6a02011-06-10 15:12:57 -0700368TEST_F(DHCPConfigTest, Stop) {
369 // Ensure no crashes.
370 const int kPID = 1 << 17; // Ensure unknown positive PID.
371 config_->Stop();
372 config_->pid_ = kPID;
373 config_->Stop();
Chris Masone2176a882011-09-14 22:29:15 -0700374 EXPECT_CALL(*glib(), SpawnClosePID(kPID)).Times(1); // Invoked by destructor.
Darin Petkov98dd6a02011-06-10 15:12:57 -0700375}
376
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800377TEST_F(DHCPConfigTest, SetProperty) {
378 EXPECT_TRUE(DBusAdaptor::SetProperty(config_->mutable_store(),
379 flimflam::kMtuProperty,
380 PropertyStoreTest::kInt32V,
381 NULL));
Chris Masone43b48a12011-07-01 13:37:07 -0700382 ::DBus::Error error;
383 // Ensure that an attempt to write a R/O property returns InvalidArgs error.
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800384 EXPECT_FALSE(DBusAdaptor::SetProperty(config_->mutable_store(),
385 flimflam::kAddressProperty,
386 PropertyStoreTest::kStringV,
387 &error));
Chris Masone9d779932011-08-25 16:33:41 -0700388 EXPECT_EQ(invalid_args(), error.name());
Chris Masone43b48a12011-07-01 13:37:07 -0700389}
390
Darin Petkove7cb7f82011-06-03 13:21:51 -0700391} // namespace shill