blob: d71d5f6e05a0bd4408ae9c3b3401fe24b312d284 [file] [log] [blame]
Paul Stewartd8ad3c42012-01-09 12:39:38 -08001// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Chris Masone3bd3c8c2011-06-13 08:20:26 -07002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "shill/service.h"
6
7#include <map>
8#include <string>
9#include <vector>
10
Eric Shienbrood9a245532012-03-07 14:20:39 -050011#include <base/bind.h>
Chris Masone3bd3c8c2011-06-13 08:20:26 -070012#include <chromeos/dbus/service_constants.h>
mukesh agrawal1830fa12011-09-26 14:31:40 -070013#include <dbus-c++/dbus.h>
Chris Masone3bd3c8c2011-06-13 08:20:26 -070014#include <gtest/gtest.h>
15#include <gmock/gmock.h>
16
17#include "shill/dbus_adaptor.h"
18#include "shill/ethernet_service.h"
Paul Stewart26b327e2011-10-19 11:38:09 -070019#include "shill/event_dispatcher.h"
Chris Masone3bd3c8c2011-06-13 08:20:26 -070020#include "shill/manager.h"
Chris Masone95207da2011-06-29 16:50:49 -070021#include "shill/mock_adaptors.h"
Chris Masone3bd3c8c2011-06-13 08:20:26 -070022#include "shill/mock_control.h"
Paul Stewart10241e32012-04-23 18:15:06 -070023#include "shill/mock_connection.h"
24#include "shill/mock_device_info.h"
Paul Stewartbc6e7392012-05-24 07:07:48 -070025#include "shill/mock_log.h"
Paul Stewart03dba0b2011-08-22 16:32:45 -070026#include "shill/mock_manager.h"
Paul Stewartff14b022012-04-24 20:06:23 -070027#include "shill/mock_profile.h"
Darin Petkovba40dd32011-07-11 20:06:39 -070028#include "shill/mock_store.h"
Paul Stewart8e7e4592012-04-29 09:47:48 -070029#include "shill/property_store_inspector.h"
Chris Masone3bd3c8c2011-06-13 08:20:26 -070030#include "shill/property_store_unittest.h"
Chris Masone6515aab2011-10-12 16:19:09 -070031#include "shill/service_under_test.h"
Chris Masone3bd3c8c2011-06-13 08:20:26 -070032
Eric Shienbrood9a245532012-03-07 14:20:39 -050033using base::Bind;
34using base::Unretained;
Chris Masone3bd3c8c2011-06-13 08:20:26 -070035using std::map;
36using std::string;
37using std::vector;
Darin Petkovba40dd32011-07-11 20:06:39 -070038using testing::_;
mukesh agrawalcf24a242012-05-21 16:46:11 -070039using testing::AnyNumber;
Darin Petkovba40dd32011-07-11 20:06:39 -070040using testing::AtLeast;
Paul Stewartd8ad3c42012-01-09 12:39:38 -080041using testing::DoAll;
Paul Stewartbc6e7392012-05-24 07:07:48 -070042using testing::HasSubstr;
Paul Stewart81426132012-05-16 10:05:10 -070043using testing::Mock;
Darin Petkovba40dd32011-07-11 20:06:39 -070044using testing::NiceMock;
45using testing::Return;
Paul Stewart10241e32012-04-23 18:15:06 -070046using testing::ReturnRef;
Darin Petkovba40dd32011-07-11 20:06:39 -070047using testing::StrictMock;
Paul Stewartd8ad3c42012-01-09 12:39:38 -080048using testing::SetArgumentPointee;
Darin Petkovba40dd32011-07-11 20:06:39 -070049using testing::Test;
Paul Stewart9f32d192012-01-30 20:37:50 -080050using testing::Values;
Chris Masone3bd3c8c2011-06-13 08:20:26 -070051
52namespace shill {
53
54class ServiceTest : public PropertyStoreTest {
55 public:
Chris Masoneb925cc82011-06-22 15:39:57 -070056 ServiceTest()
Thieu Le3426c8f2012-01-11 17:35:11 -080057 : mock_manager_(control_interface(), dispatcher(), metrics(), glib()),
Chris Masone2176a882011-09-14 22:29:15 -070058 service_(new ServiceUnderTest(control_interface(),
59 dispatcher(),
Thieu Le3426c8f2012-01-11 17:35:11 -080060 metrics(),
Paul Stewart03dba0b2011-08-22 16:32:45 -070061 &mock_manager_)),
Chris Masone9d779932011-08-25 16:33:41 -070062 storage_id_(ServiceUnderTest::kStorageId) {
63 }
Chris Masoneb925cc82011-06-22 15:39:57 -070064
Chris Masone3bd3c8c2011-06-13 08:20:26 -070065 virtual ~ServiceTest() {}
Chris Masoneb925cc82011-06-22 15:39:57 -070066
Eric Shienbrood9a245532012-03-07 14:20:39 -050067 MOCK_METHOD1(TestCallback, void(const Error &error));
68
Chris Masoneb925cc82011-06-22 15:39:57 -070069 protected:
mukesh agrawalcf24a242012-05-21 16:46:11 -070070 typedef scoped_refptr<MockProfile> MockProfileRefPtr;
Eric Shienbrood9a245532012-03-07 14:20:39 -050071
Paul Stewart03dba0b2011-08-22 16:32:45 -070072 MockManager mock_manager_;
73 scoped_refptr<ServiceUnderTest> service_;
Chris Masone34af2182011-08-22 11:59:36 -070074 string storage_id_;
Chris Masone3bd3c8c2011-06-13 08:20:26 -070075};
76
Darin Petkovba40dd32011-07-11 20:06:39 -070077TEST_F(ServiceTest, Constructor) {
78 EXPECT_TRUE(service_->save_credentials_);
79 EXPECT_EQ(Service::kCheckPortalAuto, service_->check_portal_);
Eric Shienbroodcc95c5d2012-03-30 15:25:49 -040080 EXPECT_EQ(Service::kStateIdle, service_->state());
mukesh agrawalcf24a242012-05-21 16:46:11 -070081 EXPECT_FALSE(service_->has_ever_connected());
Darin Petkovba40dd32011-07-11 20:06:39 -070082}
83
Darin Petkov58f0b6d2012-06-12 12:52:30 +020084TEST_F(ServiceTest, CalculateState) {
85 service_->state_ = Service::kStateConnected;
86 Error error;
87 EXPECT_EQ(flimflam::kStateReady, service_->CalculateState(&error));
88 EXPECT_TRUE(error.IsSuccess());
89}
90
91TEST_F(ServiceTest, CalculateTechnology) {
92 service_->technology_ = Technology::kWifi;
93 Error error;
94 EXPECT_EQ(flimflam::kTypeWifi, service_->CalculateTechnology(&error));
95 EXPECT_TRUE(error.IsSuccess());
96}
97
Chris Masonea8a2c252011-06-27 22:16:30 -070098TEST_F(ServiceTest, GetProperties) {
99 map<string, ::DBus::Variant> props;
100 Error error(Error::kInvalidProperty, "");
101 {
102 ::DBus::Error dbus_error;
Paul Stewartd215af62012-04-24 23:25:50 -0700103 string expected("true");
mukesh agrawalde29fa82011-09-16 16:16:36 -0700104 service_->mutable_store()->SetStringProperty(flimflam::kCheckPortalProperty,
105 expected,
106 &error);
Chris Masone27c4aa52011-07-02 13:10:14 -0700107 DBusAdaptor::GetProperties(service_->store(), &props, &dbus_error);
Chris Masonea8a2c252011-06-27 22:16:30 -0700108 ASSERT_FALSE(props.find(flimflam::kCheckPortalProperty) == props.end());
109 EXPECT_EQ(props[flimflam::kCheckPortalProperty].reader().get_string(),
110 expected);
111 }
112 {
113 ::DBus::Error dbus_error;
114 bool expected = true;
Thieu Le284fe792012-01-31 17:53:19 -0800115 service_->set_favorite(true);
mukesh agrawalde29fa82011-09-16 16:16:36 -0700116 service_->mutable_store()->SetBoolProperty(flimflam::kAutoConnectProperty,
117 expected,
118 &error);
Chris Masone27c4aa52011-07-02 13:10:14 -0700119 DBusAdaptor::GetProperties(service_->store(), &props, &dbus_error);
Chris Masonea8a2c252011-06-27 22:16:30 -0700120 ASSERT_FALSE(props.find(flimflam::kAutoConnectProperty) == props.end());
121 EXPECT_EQ(props[flimflam::kAutoConnectProperty].reader().get_bool(),
122 expected);
123 }
124 {
125 ::DBus::Error dbus_error;
Chris Masone27c4aa52011-07-02 13:10:14 -0700126 DBusAdaptor::GetProperties(service_->store(), &props, &dbus_error);
Chris Masonea8a2c252011-06-27 22:16:30 -0700127 ASSERT_FALSE(props.find(flimflam::kConnectableProperty) == props.end());
128 EXPECT_EQ(props[flimflam::kConnectableProperty].reader().get_bool(), false);
129 }
130 {
131 ::DBus::Error dbus_error;
132 int32 expected = 127;
mukesh agrawalde29fa82011-09-16 16:16:36 -0700133 service_->mutable_store()->SetInt32Property(flimflam::kPriorityProperty,
134 expected,
135 &error);
Chris Masone27c4aa52011-07-02 13:10:14 -0700136 DBusAdaptor::GetProperties(service_->store(), &props, &dbus_error);
Chris Masonea8a2c252011-06-27 22:16:30 -0700137 ASSERT_FALSE(props.find(flimflam::kPriorityProperty) == props.end());
138 EXPECT_EQ(props[flimflam::kPriorityProperty].reader().get_int32(),
139 expected);
140 }
Chris Masone95207da2011-06-29 16:50:49 -0700141 {
142 ::DBus::Error dbus_error;
Chris Masone27c4aa52011-07-02 13:10:14 -0700143 DBusAdaptor::GetProperties(service_->store(), &props, &dbus_error);
Chris Masone95207da2011-06-29 16:50:49 -0700144 ASSERT_FALSE(props.find(flimflam::kDeviceProperty) == props.end());
Jason Glasgowacdc11f2012-03-30 14:12:22 -0400145 EXPECT_EQ(props[flimflam::kDeviceProperty].reader().get_path(),
Paul Stewart03dba0b2011-08-22 16:32:45 -0700146 string(ServiceUnderTest::kRpcId));
Chris Masone95207da2011-06-29 16:50:49 -0700147 }
Chris Masonea8a2c252011-06-27 22:16:30 -0700148}
Chris Masone3bd3c8c2011-06-13 08:20:26 -0700149
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800150TEST_F(ServiceTest, SetProperty) {
Chris Masonea8a2c252011-06-27 22:16:30 -0700151 {
152 ::DBus::Error error;
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800153 EXPECT_TRUE(DBusAdaptor::SetProperty(service_->mutable_store(),
154 flimflam::kSaveCredentialsProperty,
155 PropertyStoreTest::kBoolV,
156 &error));
Chris Masonea8a2c252011-06-27 22:16:30 -0700157 }
158 {
159 ::DBus::Error error;
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800160 EXPECT_TRUE(DBusAdaptor::SetProperty(service_->mutable_store(),
161 flimflam::kPriorityProperty,
162 PropertyStoreTest::kInt32V,
163 &error));
Chris Masonea8a2c252011-06-27 22:16:30 -0700164 }
165 {
166 ::DBus::Error error;
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800167 EXPECT_TRUE(DBusAdaptor::SetProperty(service_->mutable_store(),
168 flimflam::kEAPEAPProperty,
169 PropertyStoreTest::kStringV,
170 &error));
Chris Masonea8a2c252011-06-27 22:16:30 -0700171 }
Chris Masoneb925cc82011-06-22 15:39:57 -0700172 // Ensure that an attempt to write a R/O property returns InvalidArgs error.
Chris Masonea8a2c252011-06-27 22:16:30 -0700173 {
174 ::DBus::Error error;
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800175 EXPECT_FALSE(DBusAdaptor::SetProperty(service_->mutable_store(),
176 flimflam::kFavoriteProperty,
177 PropertyStoreTest::kBoolV,
178 &error));
Chris Masone9d779932011-08-25 16:33:41 -0700179 EXPECT_EQ(invalid_args(), error.name());
Chris Masonea8a2c252011-06-27 22:16:30 -0700180 }
Thieu Le284fe792012-01-31 17:53:19 -0800181 {
182 ::DBus::Error error;
183 service_->set_favorite(true);
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800184 EXPECT_TRUE(DBusAdaptor::SetProperty(service_->mutable_store(),
185 flimflam::kAutoConnectProperty,
186 PropertyStoreTest::kBoolV,
187 &error));
Thieu Le284fe792012-01-31 17:53:19 -0800188 }
189 {
190 ::DBus::Error error;
191 service_->set_favorite(false);
Wade Guthrie4f28e8b2012-04-11 10:52:07 -0700192 EXPECT_TRUE(DBusAdaptor::SetProperty(service_->mutable_store(),
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800193 flimflam::kAutoConnectProperty,
194 PropertyStoreTest::kBoolV,
195 &error));
Thieu Le284fe792012-01-31 17:53:19 -0800196 }
Paul Stewart0c438332012-04-11 07:55:27 -0700197 // Ensure that we can perform a trivial set of the Name property (to its
198 // current value) but an attempt to set the property to a different value
199 // fails.
200 {
201 ::DBus::Error error;
202 EXPECT_TRUE(DBusAdaptor::SetProperty(service_->mutable_store(),
203 flimflam::kNameProperty,
204 DBusAdaptor::StringToVariant(
205 service_->friendly_name()),
206 &error));
207 }
208 {
209 ::DBus::Error error;
210 EXPECT_FALSE(DBusAdaptor::SetProperty(service_->mutable_store(),
211 flimflam::kNameProperty,
212 PropertyStoreTest::kStringV,
213 &error));
214 EXPECT_EQ(invalid_args(), error.name());
215 }
Chris Masoneb925cc82011-06-22 15:39:57 -0700216}
217
Darin Petkovba40dd32011-07-11 20:06:39 -0700218TEST_F(ServiceTest, Load) {
219 NiceMock<MockStore> storage;
Chris Masone34af2182011-08-22 11:59:36 -0700220 EXPECT_CALL(storage, ContainsGroup(storage_id_)).WillOnce(Return(true));
221 EXPECT_CALL(storage, GetString(storage_id_, _, _))
Darin Petkovba40dd32011-07-11 20:06:39 -0700222 .Times(AtLeast(1))
223 .WillRepeatedly(Return(true));
Chris Masone9d779932011-08-25 16:33:41 -0700224 EXPECT_TRUE(service_->Load(&storage));
Darin Petkovba40dd32011-07-11 20:06:39 -0700225}
226
227TEST_F(ServiceTest, LoadFail) {
228 StrictMock<MockStore> storage;
Chris Masone34af2182011-08-22 11:59:36 -0700229 EXPECT_CALL(storage, ContainsGroup(storage_id_)).WillOnce(Return(false));
Chris Masone9d779932011-08-25 16:33:41 -0700230 EXPECT_FALSE(service_->Load(&storage));
Darin Petkovba40dd32011-07-11 20:06:39 -0700231}
232
233TEST_F(ServiceTest, SaveString) {
234 MockStore storage;
235 static const char kKey[] = "test-key";
236 static const char kData[] = "test-data";
Chris Masone34af2182011-08-22 11:59:36 -0700237 EXPECT_CALL(storage, SetString(storage_id_, kKey, kData))
Darin Petkovba40dd32011-07-11 20:06:39 -0700238 .WillOnce(Return(true));
Chris Masone34af2182011-08-22 11:59:36 -0700239 service_->SaveString(&storage, storage_id_, kKey, kData, false, true);
Darin Petkovba40dd32011-07-11 20:06:39 -0700240}
241
242TEST_F(ServiceTest, SaveStringCrypted) {
243 MockStore storage;
244 static const char kKey[] = "test-key";
245 static const char kData[] = "test-data";
Chris Masone34af2182011-08-22 11:59:36 -0700246 EXPECT_CALL(storage, SetCryptedString(storage_id_, kKey, kData))
Darin Petkovba40dd32011-07-11 20:06:39 -0700247 .WillOnce(Return(true));
Chris Masone34af2182011-08-22 11:59:36 -0700248 service_->SaveString(&storage, storage_id_, kKey, kData, true, true);
Darin Petkovba40dd32011-07-11 20:06:39 -0700249}
250
251TEST_F(ServiceTest, SaveStringDontSave) {
252 MockStore storage;
253 static const char kKey[] = "test-key";
Chris Masone34af2182011-08-22 11:59:36 -0700254 EXPECT_CALL(storage, DeleteKey(storage_id_, kKey))
Darin Petkovba40dd32011-07-11 20:06:39 -0700255 .WillOnce(Return(true));
Chris Masone34af2182011-08-22 11:59:36 -0700256 service_->SaveString(&storage, storage_id_, kKey, "data", false, false);
Darin Petkovba40dd32011-07-11 20:06:39 -0700257}
258
259TEST_F(ServiceTest, SaveStringEmpty) {
260 MockStore storage;
261 static const char kKey[] = "test-key";
Chris Masone34af2182011-08-22 11:59:36 -0700262 EXPECT_CALL(storage, DeleteKey(storage_id_, kKey))
Darin Petkovba40dd32011-07-11 20:06:39 -0700263 .WillOnce(Return(true));
Chris Masone34af2182011-08-22 11:59:36 -0700264 service_->SaveString(&storage, storage_id_, kKey, "", true, true);
Darin Petkovba40dd32011-07-11 20:06:39 -0700265}
266
267TEST_F(ServiceTest, Save) {
268 NiceMock<MockStore> storage;
Chris Masone34af2182011-08-22 11:59:36 -0700269 EXPECT_CALL(storage, SetString(storage_id_, _, _))
Darin Petkovba40dd32011-07-11 20:06:39 -0700270 .Times(AtLeast(1))
271 .WillRepeatedly(Return(true));
Chris Masone34af2182011-08-22 11:59:36 -0700272 EXPECT_CALL(storage, DeleteKey(storage_id_, _))
Darin Petkovba40dd32011-07-11 20:06:39 -0700273 .Times(AtLeast(1))
274 .WillRepeatedly(Return(true));
Chris Masone9d779932011-08-25 16:33:41 -0700275 EXPECT_TRUE(service_->Save(&storage));
Darin Petkovba40dd32011-07-11 20:06:39 -0700276}
277
Paul Stewartd8ad3c42012-01-09 12:39:38 -0800278TEST_F(ServiceTest, Unload) {
279 NiceMock<MockStore> storage;
280 EXPECT_CALL(storage, ContainsGroup(storage_id_)).WillOnce(Return(true));
281 static const string string_value("value");
282 EXPECT_CALL(storage, GetString(storage_id_, _, _))
283 .Times(AtLeast(1))
284 .WillRepeatedly(DoAll(SetArgumentPointee<2>(string_value), Return(true)));
285 ASSERT_TRUE(service_->Load(&storage));
286 // TODO(pstew): A single string property in the service is tested as
mukesh agrawalcf24a242012-05-21 16:46:11 -0700287 // a sentinel that properties are being set and reset at the right times.
Paul Stewartd8ad3c42012-01-09 12:39:38 -0800288 // However, since property load/store is essentially a manual process,
289 // it is error prone and should either be exhaustively unit-tested or
290 // a generic framework for registering loaded/stored properties should
291 // be created. crosbug.com/24859
292 EXPECT_EQ(string_value, service_->ui_data_);
293 service_->Unload();
294 EXPECT_EQ(string(""), service_->ui_data_);
295}
296
Paul Stewart03dba0b2011-08-22 16:32:45 -0700297TEST_F(ServiceTest, State) {
Eric Shienbroodcc95c5d2012-03-30 15:25:49 -0400298 EXPECT_EQ(Service::kStateIdle, service_->state());
Paul Stewart03dba0b2011-08-22 16:32:45 -0700299 EXPECT_EQ(Service::kFailureUnknown, service_->failure());
300
mukesh agrawal00917ce2011-11-22 23:56:55 +0000301 ServiceRefPtr service_ref(service_);
mukesh agrawalf2f68a52011-09-01 12:15:48 -0700302
Eric Shienbroodcc95c5d2012-03-30 15:25:49 -0400303 EXPECT_CALL(*dynamic_cast<ServiceMockAdaptor *>(service_->adaptor_.get()),
mukesh agrawalcf24a242012-05-21 16:46:11 -0700304 EmitStringChanged(flimflam::kStateProperty, _)).Times(7);
Paul Stewart03dba0b2011-08-22 16:32:45 -0700305 EXPECT_CALL(mock_manager_, UpdateService(service_ref));
306 service_->SetState(Service::kStateConnected);
307 // A second state change shouldn't cause another update
308 service_->SetState(Service::kStateConnected);
Paul Stewart03dba0b2011-08-22 16:32:45 -0700309 EXPECT_EQ(Service::kStateConnected, service_->state());
310 EXPECT_EQ(Service::kFailureUnknown, service_->failure());
mukesh agrawalcf24a242012-05-21 16:46:11 -0700311 EXPECT_TRUE(service_->has_ever_connected_);
mukesh agrawal568b5c62012-02-28 14:44:47 -0800312
Paul Stewart03dba0b2011-08-22 16:32:45 -0700313 EXPECT_CALL(mock_manager_, UpdateService(service_ref));
314 service_->SetState(Service::kStateDisconnected);
315
316 EXPECT_CALL(mock_manager_, UpdateService(service_ref));
317 service_->SetFailure(Service::kFailureOutOfRange);
mukesh agrawal568b5c62012-02-28 14:44:47 -0800318 EXPECT_TRUE(service_->IsFailed());
319 EXPECT_GT(service_->failed_time_, 0);
Paul Stewart03dba0b2011-08-22 16:32:45 -0700320 EXPECT_EQ(Service::kStateFailure, service_->state());
321 EXPECT_EQ(Service::kFailureOutOfRange, service_->failure());
mukesh agrawal568b5c62012-02-28 14:44:47 -0800322
323 EXPECT_CALL(mock_manager_, UpdateService(service_ref));
324 service_->SetState(Service::kStateConnected);
325 EXPECT_FALSE(service_->IsFailed());
326 EXPECT_EQ(service_->failed_time_, 0);
327
328 EXPECT_CALL(mock_manager_, UpdateService(service_ref));
329 service_->SetFailureSilent(Service::kFailurePinMissing);
330 EXPECT_TRUE(service_->IsFailed());
331 EXPECT_GT(service_->failed_time_, 0);
332 EXPECT_EQ(Service::kStateIdle, service_->state());
333 EXPECT_EQ(Service::kFailurePinMissing, service_->failure());
mukesh agrawalcf24a242012-05-21 16:46:11 -0700334
335 // If the Service has a Profile, the profile should be saved when
336 // the service enters kStateConnected. (The case where the service
337 // doesn't have a profile is tested above.)
338 MockProfileRefPtr mock_profile(
339 new MockProfile(control_interface(), &mock_manager_));
340 NiceMock<MockStore> storage;
341 service_->set_profile(mock_profile);
342 service_->has_ever_connected_ = false;
343 EXPECT_CALL(mock_manager_, UpdateService(service_ref));
344 EXPECT_CALL(*mock_profile, GetConstStorage())
345 .WillOnce(Return(&storage));
346 EXPECT_CALL(*mock_profile, UpdateService(service_ref));
347 service_->SetState(Service::kStateConnected);
348 EXPECT_TRUE(service_->has_ever_connected_);
349 service_->set_profile(NULL); // Break reference cycle.
350
351 // Similar to the above, but emulate an emphemeral profile, which
352 // has no storage. We can't update the service in the profile, but
353 // we should not crash.
354 service_->state_ = Service::kStateIdle; // Skips state change logic.
355 service_->set_profile(mock_profile);
356 service_->has_ever_connected_ = false;
357 EXPECT_CALL(mock_manager_, UpdateService(service_ref));
358 EXPECT_CALL(*mock_profile, GetConstStorage()).
359 WillOnce(Return(static_cast<StoreInterface *>(NULL)));
360 service_->SetState(Service::kStateConnected);
361 EXPECT_TRUE(service_->has_ever_connected_);
362 service_->set_profile(NULL); // Break reference cycle.
Paul Stewart03dba0b2011-08-22 16:32:45 -0700363}
364
Darin Petkovb100ae72011-08-24 16:19:45 -0700365TEST_F(ServiceTest, ActivateCellularModem) {
Eric Shienbrood9a245532012-03-07 14:20:39 -0500366 ResultCallback callback =
367 Bind(&ServiceTest::TestCallback, Unretained(this));
368 EXPECT_CALL(*this, TestCallback(_)).Times(0);
Darin Petkovb100ae72011-08-24 16:19:45 -0700369 Error error;
Eric Shienbrood9a245532012-03-07 14:20:39 -0500370 service_->ActivateCellularModem("Carrier", &error, callback);
371 EXPECT_TRUE(error.IsFailure());
Darin Petkovb100ae72011-08-24 16:19:45 -0700372}
373
mukesh agrawal00917ce2011-11-22 23:56:55 +0000374TEST_F(ServiceTest, MakeFavorite) {
375 EXPECT_FALSE(service_->favorite());
376 EXPECT_FALSE(service_->auto_connect());
377
378 service_->MakeFavorite();
379 EXPECT_TRUE(service_->favorite());
380 EXPECT_TRUE(service_->auto_connect());
381}
382
383TEST_F(ServiceTest, ReMakeFavorite) {
384 service_->MakeFavorite();
385 EXPECT_TRUE(service_->favorite());
386 EXPECT_TRUE(service_->auto_connect());
387
388 service_->set_auto_connect(false);
389 service_->MakeFavorite();
390 EXPECT_TRUE(service_->favorite());
391 EXPECT_FALSE(service_->auto_connect());
392}
393
mukesh agrawal76d13882012-01-12 15:23:11 -0800394TEST_F(ServiceTest, IsAutoConnectable) {
mukesh agrawalbf14e942012-03-02 14:36:34 -0800395 const char *reason;
mukesh agrawal76d13882012-01-12 15:23:11 -0800396 service_->set_connectable(true);
mukesh agrawalbf14e942012-03-02 14:36:34 -0800397 EXPECT_TRUE(service_->IsAutoConnectable(&reason));
mukesh agrawal76d13882012-01-12 15:23:11 -0800398
mukesh agrawaladb68482012-01-17 16:31:51 -0800399 // We should not auto-connect to a Service that a user has
400 // deliberately disconnected.
401 Error error;
402 service_->Disconnect(&error);
mukesh agrawalbf14e942012-03-02 14:36:34 -0800403 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
404 EXPECT_STREQ(Service::kAutoConnExplicitDisconnect, reason);
mukesh agrawaladb68482012-01-17 16:31:51 -0800405
406 // But if the Service is reloaded, it is eligible for auto-connect
407 // again.
408 NiceMock<MockStore> storage;
409 EXPECT_CALL(storage, ContainsGroup(storage_id_)).WillOnce(Return(true));
410 EXPECT_TRUE(service_->Load(&storage));
mukesh agrawalbf14e942012-03-02 14:36:34 -0800411 EXPECT_TRUE(service_->IsAutoConnectable(&reason));
mukesh agrawaladb68482012-01-17 16:31:51 -0800412
413 // A deliberate Connect should also re-enable auto-connect.
414 service_->Disconnect(&error);
mukesh agrawalbf14e942012-03-02 14:36:34 -0800415 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
mukesh agrawaladb68482012-01-17 16:31:51 -0800416 service_->Connect(&error);
mukesh agrawalbf14e942012-03-02 14:36:34 -0800417 EXPECT_TRUE(service_->IsAutoConnectable(&reason));
mukesh agrawaladb68482012-01-17 16:31:51 -0800418
419 // TODO(quiche): After we have resume handling in place, test that
420 // we re-enable auto-connect on resume. crosbug.com/25213
421
mukesh agrawal76d13882012-01-12 15:23:11 -0800422 service_->SetState(Service::kStateConnected);
mukesh agrawalbf14e942012-03-02 14:36:34 -0800423 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
424 EXPECT_STREQ(Service::kAutoConnConnected, reason);
mukesh agrawal76d13882012-01-12 15:23:11 -0800425
426 service_->SetState(Service::kStateAssociating);
mukesh agrawalbf14e942012-03-02 14:36:34 -0800427 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
428 EXPECT_STREQ(Service::kAutoConnConnecting, reason);
mukesh agrawal76d13882012-01-12 15:23:11 -0800429}
430
Paul Stewartcb59fed2012-03-21 21:14:46 -0700431TEST_F(ServiceTest, ConfigureBadProperty) {
432 KeyValueStore args;
433 args.SetString("XXXInvalid", "Value");
434 Error error;
435 service_->Configure(args, &error);
436 EXPECT_FALSE(error.IsSuccess());
437}
438
439TEST_F(ServiceTest, ConfigureBoolProperty) {
440 service_->MakeFavorite();
441 service_->set_auto_connect(false);
442 ASSERT_FALSE(service_->auto_connect());
443 KeyValueStore args;
444 args.SetBool(flimflam::kAutoConnectProperty, true);
445 Error error;
446 service_->Configure(args, &error);
447 EXPECT_TRUE(error.IsSuccess());
448 EXPECT_TRUE(service_->auto_connect());
449}
450
451TEST_F(ServiceTest, ConfigureStringProperty) {
452 const string kEAPManagement0 = "management_zero";
453 const string kEAPManagement1 = "management_one";
454 service_->SetEAPKeyManagement(kEAPManagement0);
455 ASSERT_EQ(kEAPManagement0, service_->GetEAPKeyManagement());
456 KeyValueStore args;
457 args.SetString(flimflam::kEapKeyMgmtProperty, kEAPManagement1);
458 Error error;
459 service_->Configure(args, &error);
460 EXPECT_TRUE(error.IsSuccess());
461 EXPECT_EQ(kEAPManagement1, service_->GetEAPKeyManagement());
462}
463
464TEST_F(ServiceTest, ConfigureIgnoredProperty) {
465 service_->MakeFavorite();
466 service_->set_auto_connect(false);
467 ASSERT_FALSE(service_->auto_connect());
468 KeyValueStore args;
469 args.SetBool(flimflam::kAutoConnectProperty, true);
470 Error error;
471 service_->IgnoreParameterForConfigure(flimflam::kAutoConnectProperty);
472 service_->Configure(args, &error);
473 EXPECT_TRUE(error.IsSuccess());
474 EXPECT_FALSE(service_->auto_connect());
475}
476
Paul Stewart10ccbb32012-04-26 15:59:30 -0700477TEST_F(ServiceTest, IsRemembered) {
478 ServiceConstRefPtr service_ref(service_);
479 service_->set_profile(NULL);
480 EXPECT_CALL(mock_manager_, IsServiceEphemeral(_)).Times(0);
481 EXPECT_FALSE(service_->IsRemembered());
482
483 scoped_refptr<MockProfile> profile(
484 new StrictMock<MockProfile>(control_interface(), manager()));
485 service_->set_profile(profile);
486 EXPECT_CALL(mock_manager_, IsServiceEphemeral(service_ref))
487 .WillOnce(Return(true))
488 .WillOnce(Return(false));
489 EXPECT_FALSE(service_->IsRemembered());
490 EXPECT_TRUE(service_->IsRemembered());
491}
492
Paul Stewartff14b022012-04-24 20:06:23 -0700493TEST_F(ServiceTest, OnPropertyChanged) {
494 scoped_refptr<MockProfile> profile(
495 new StrictMock<MockProfile>(control_interface(), manager()));
496 service_->set_profile(NULL);
497 // Expect no crash.
498 service_->OnPropertyChanged("");
499
500 // Expect no call to Update if the profile has no storage.
501 service_->set_profile(profile);
502 EXPECT_CALL(*profile, UpdateService(_)).Times(0);
503 EXPECT_CALL(*profile, GetConstStorage())
504 .WillOnce(Return(reinterpret_cast<StoreInterface *>(NULL)));
505 service_->OnPropertyChanged("");
506
507 // Expect call to Update if the profile has storage.
508 EXPECT_CALL(*profile, UpdateService(_)).Times(1);
509 NiceMock<MockStore> storage;
510 EXPECT_CALL(*profile, GetConstStorage()).WillOnce(Return(&storage));
511 service_->OnPropertyChanged("");
512}
513
Paul Stewartd215af62012-04-24 23:25:50 -0700514
515TEST_F(ServiceTest, RecheckPortal) {
516 ServiceRefPtr service_ref(service_);
517 service_->state_ = Service::kStateIdle;
518 EXPECT_CALL(mock_manager_, RecheckPortalOnService(_)).Times(0);
519 service_->OnPropertyChanged(flimflam::kCheckPortalProperty);
520
521 service_->state_ = Service::kStatePortal;
522 EXPECT_CALL(mock_manager_, RecheckPortalOnService(service_ref)).Times(1);
523 service_->OnPropertyChanged(flimflam::kCheckPortalProperty);
524
525 service_->state_ = Service::kStateConnected;
526 EXPECT_CALL(mock_manager_, RecheckPortalOnService(service_ref)).Times(1);
527 service_->OnPropertyChanged(flimflam::kProxyConfigProperty);
528
529 service_->state_ = Service::kStateOnline;
530 EXPECT_CALL(mock_manager_, RecheckPortalOnService(service_ref)).Times(1);
531 service_->OnPropertyChanged(flimflam::kCheckPortalProperty);
532
533 service_->state_ = Service::kStatePortal;
534 EXPECT_CALL(mock_manager_, RecheckPortalOnService(_)).Times(0);
535 service_->OnPropertyChanged(flimflam::kEAPKeyIDProperty);
536}
537
538TEST_F(ServiceTest, SetCheckPortal) {
539 ServiceRefPtr service_ref(service_);
540 {
541 Error error;
542 service_->SetCheckPortal("false", &error);
543 EXPECT_TRUE(error.IsSuccess());
544 EXPECT_EQ(Service::kCheckPortalFalse, service_->check_portal_);
545 }
546 {
547 Error error;
548 service_->SetCheckPortal("true", &error);
549 EXPECT_TRUE(error.IsSuccess());
550 EXPECT_EQ(Service::kCheckPortalTrue, service_->check_portal_);
551 }
552 {
553 Error error;
554 service_->SetCheckPortal("auto", &error);
555 EXPECT_TRUE(error.IsSuccess());
556 EXPECT_EQ(Service::kCheckPortalAuto, service_->check_portal_);
557 }
558 {
559 Error error;
560 service_->SetCheckPortal("xxx", &error);
561 EXPECT_FALSE(error.IsSuccess());
562 EXPECT_EQ(Error::kInvalidArguments, error.type());
563 EXPECT_EQ(Service::kCheckPortalAuto, service_->check_portal_);
564 }
565}
566
Darin Petkovb2ba39f2012-06-06 10:33:43 +0200567TEST_F(ServiceTest, SetConnectable) {
568 EXPECT_FALSE(service_->connectable());
569
570 ServiceMockAdaptor *adaptor =
571 dynamic_cast<ServiceMockAdaptor *>(service_->adaptor());
572
573 EXPECT_CALL(*adaptor, EmitBoolChanged(_, _)).Times(0);
574 EXPECT_CALL(mock_manager_, HasService(_)).Times(0);
575 service_->SetConnectable(false);
576 EXPECT_FALSE(service_->connectable());
577
578 EXPECT_CALL(*adaptor, EmitBoolChanged(flimflam::kConnectableProperty, true));
579 EXPECT_CALL(mock_manager_, HasService(_)).WillOnce(Return(false));
580 EXPECT_CALL(mock_manager_, UpdateService(_)).Times(0);
581 service_->SetConnectable(true);
582 EXPECT_TRUE(service_->connectable());
583
584 EXPECT_CALL(*adaptor, EmitBoolChanged(flimflam::kConnectableProperty, false));
585 EXPECT_CALL(mock_manager_, HasService(_)).WillOnce(Return(true));
586 EXPECT_CALL(mock_manager_, UpdateService(_));
587 service_->SetConnectable(false);
588 EXPECT_FALSE(service_->connectable());
589
590 EXPECT_CALL(*adaptor, EmitBoolChanged(flimflam::kConnectableProperty, true));
591 EXPECT_CALL(mock_manager_, HasService(_)).WillOnce(Return(true));
592 EXPECT_CALL(mock_manager_, UpdateService(_));
593 service_->SetConnectable(true);
594 EXPECT_TRUE(service_->connectable());
595}
596
Paul Stewart9f32d192012-01-30 20:37:50 -0800597// Make sure a property is registered as a write only property
598// by reading and comparing all string properties returned on the store.
599// Subtle: We need to convert the test argument back and forth between
600// string and ::DBus::Variant because this is the parameter type that
601// our supeclass (PropertyStoreTest) is declared with.
602class ReadOnlyServicePropertyTest : public ServiceTest {};
603TEST_P(ReadOnlyServicePropertyTest, PropertyWriteOnly) {
Paul Stewart9f32d192012-01-30 20:37:50 -0800604 string property(GetParam().reader().get_string());
Paul Stewart8e7e4592012-04-29 09:47:48 -0700605 PropertyStoreInspector inspector(&service_->store());
Darin Petkov4682aa82012-05-31 16:24:11 +0200606 EXPECT_FALSE(inspector.GetStringProperty(property, NULL));
Paul Stewart9f32d192012-01-30 20:37:50 -0800607}
608
609INSTANTIATE_TEST_CASE_P(
610 ReadOnlyServicePropertyTestInstance,
611 ReadOnlyServicePropertyTest,
612 Values(
613 DBusAdaptor::StringToVariant(flimflam::kEapPrivateKeyPasswordProperty),
614 DBusAdaptor::StringToVariant(flimflam::kEapPasswordProperty)));
615
Paul Stewart10241e32012-04-23 18:15:06 -0700616
617TEST_F(ServiceTest, GetIPConfigRpcIdentifier) {
618 {
619 Error error;
620 EXPECT_EQ("/", service_->GetIPConfigRpcIdentifier(&error));
621 EXPECT_EQ(Error::kNotFound, error.type());
622 }
623
624 scoped_ptr<MockDeviceInfo> mock_device_info(
625 new NiceMock<MockDeviceInfo>(control_interface(), dispatcher(), metrics(),
626 &mock_manager_));
627 scoped_refptr<MockConnection> mock_connection(
628 new NiceMock<MockConnection>(mock_device_info.get()));
629
630 service_->connection_ = mock_connection;
631
632 {
633 Error error;
634 const string empty_string;
635 EXPECT_CALL(*mock_connection, ipconfig_rpc_identifier())
636 .WillOnce(ReturnRef(empty_string));
637 EXPECT_EQ("/", service_->GetIPConfigRpcIdentifier(&error));
638 EXPECT_EQ(Error::kNotFound, error.type());
639 }
640
641 {
642 Error error;
643 const string nonempty_string("/ipconfig/path");
644 EXPECT_CALL(*mock_connection, ipconfig_rpc_identifier())
645 .WillOnce(ReturnRef(nonempty_string));
646 EXPECT_EQ(nonempty_string, service_->GetIPConfigRpcIdentifier(&error));
647 EXPECT_EQ(Error::kSuccess, error.type());
648 }
649
650 // Assure orderly destruction of the Connection before DeviceInfo.
651 service_->connection_ = NULL;
652 mock_connection = NULL;
653 mock_device_info.reset();
654}
655
Paul Stewart81426132012-05-16 10:05:10 -0700656class ServiceWithMockSetEap : public ServiceUnderTest {
657 public:
658 ServiceWithMockSetEap(ControlInterface *control_interface,
659 EventDispatcher *dispatcher,
660 Metrics *metrics,
661 Manager *manager)
662 : ServiceUnderTest(control_interface, dispatcher, metrics, manager),
663 is_8021x_(false) {}
664 MOCK_METHOD1(set_eap, void(const EapCredentials &eap));
665 virtual bool Is8021x() const { return is_8021x_; }
666 void set_is_8021x(bool is_8021x) { is_8021x_ = is_8021x; }
667
668 private:
669 bool is_8021x_;
670};
671
672TEST_F(ServiceTest, SetEAPCredentialsOverRPC) {
673 scoped_refptr<ServiceWithMockSetEap> service(
674 new ServiceWithMockSetEap(control_interface(),
675 dispatcher(),
676 metrics(),
677 &mock_manager_));
678 string eap_credential_properties[] = {
679 flimflam::kEAPCertIDProperty,
680 flimflam::kEAPClientCertProperty,
681 flimflam::kEAPKeyIDProperty,
682 flimflam::kEAPPINProperty,
683 flimflam::kEapCaCertIDProperty,
684 flimflam::kEapIdentityProperty,
685 flimflam::kEapPasswordProperty,
686 flimflam::kEapPrivateKeyProperty
687 };
688 string eap_non_credential_properties[] = {
689 flimflam::kEAPEAPProperty,
690 flimflam::kEapPhase2AuthProperty,
691 flimflam::kEapAnonymousIdentityProperty,
692 flimflam::kEapPrivateKeyPasswordProperty,
693 flimflam::kEapKeyMgmtProperty,
694 flimflam::kEapCaCertNssProperty,
695 flimflam::kEapUseSystemCAsProperty
696 };
697 // While this is not an 802.1x-based service, none of these property
698 // changes should cause a call to set_eap().
699 EXPECT_CALL(*service, set_eap(_)).Times(0);
700 for (size_t i = 0; i < arraysize(eap_credential_properties); ++i)
701 service->OnPropertyChanged(eap_credential_properties[i]);
702 for (size_t i = 0; i < arraysize(eap_non_credential_properties); ++i)
703 service->OnPropertyChanged(eap_non_credential_properties[i]);
704
705 service->set_is_8021x(true);
706
707 // When this is an 802.1x-based service, set_eap should be called for
708 // all credential-carrying properties.
709 for (size_t i = 0; i < arraysize(eap_credential_properties); ++i) {
710 EXPECT_CALL(*service, set_eap(_)).Times(1);
711 service->OnPropertyChanged(eap_credential_properties[i]);
712 Mock::VerifyAndClearExpectations(service.get());
713 }
714 EXPECT_CALL(*service, set_eap(_)).Times(0);
715 for (size_t i = 0; i < arraysize(eap_non_credential_properties); ++i)
716 service->OnPropertyChanged(eap_non_credential_properties[i]);
717}
718
Paul Stewartbc6e7392012-05-24 07:07:48 -0700719TEST_F(ServiceTest, Certification) {
720 EXPECT_FALSE(service_->eap_.remote_certification.size());
721
722 ScopedMockLog log;
723 EXPECT_CALL(log, Log(logging::LOG_WARNING, _,
724 HasSubstr("exceeds our maximum"))).Times(2);
725 string kSubject("foo");
726 EXPECT_FALSE(service_->AddEAPCertification(
727 kSubject, Service::kEAPMaxCertificationElements));
728 EXPECT_FALSE(service_->AddEAPCertification(
729 kSubject, Service::kEAPMaxCertificationElements + 1));
730 EXPECT_FALSE(service_->eap_.remote_certification.size());
731 Mock::VerifyAndClearExpectations(&log);
732
733 EXPECT_CALL(log,
734 Log(logging::LOG_INFO, _, HasSubstr("Received certification")))
735 .Times(1);
736 EXPECT_TRUE(service_->AddEAPCertification(
737 kSubject, Service::kEAPMaxCertificationElements - 1));
738 Mock::VerifyAndClearExpectations(&log);
739 EXPECT_EQ(Service::kEAPMaxCertificationElements,
740 service_->eap_.remote_certification.size());
741 for (size_t i = 0; i < Service::kEAPMaxCertificationElements - 1; ++i) {
742 EXPECT_TRUE(service_->eap_.remote_certification[i].empty());
743 }
744 EXPECT_EQ(kSubject, service_->eap_.remote_certification[
745 Service::kEAPMaxCertificationElements - 1]);
746
747 // Re-adding the same name in the same position should not generate a log.
748 EXPECT_CALL(log, Log(_, _, _)).Times(0);
749 EXPECT_TRUE(service_->AddEAPCertification(
750 kSubject, Service::kEAPMaxCertificationElements - 1));
751
752 // Replacing the item should generate a log message.
753 EXPECT_CALL(log,
754 Log(logging::LOG_INFO, _, HasSubstr("Received certification")))
755 .Times(1);
756 EXPECT_TRUE(service_->AddEAPCertification(
757 kSubject + "x", Service::kEAPMaxCertificationElements - 1));
758}
759
Chris Masone3bd3c8c2011-06-13 08:20:26 -0700760} // namespace shill