blob: 38f11bb5b8f37c05ae69cf3ad9dbb7a14d5d93ad [file] [log] [blame]
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -08001// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
Darin Petkove7cb7f82011-06-03 13:21:51 -07002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
Chris Masone8a7b8be2011-07-22 12:43:37 -07005#include "shill/dhcp_config.h"
6
Eric Shienbrood3e20a232012-02-16 11:35:56 -05007#include <base/bind.h>
Darin Petkov92c43902011-06-09 20:46:06 -07008#include <base/file_util.h>
Eric Shienbrood3e20a232012-02-16 11:35:56 -05009#include <base/scoped_temp_dir.h>
Darin Petkov92c43902011-06-09 20:46:06 -070010#include <base/stringprintf.h>
Chris Masone43b48a12011-07-01 13:37:07 -070011#include <chromeos/dbus/service_constants.h>
Chris Masone8a7b8be2011-07-22 12:43:37 -070012#include <gtest/gtest.h>
Darin Petkov92c43902011-06-09 20:46:06 -070013
Chris Masone43b48a12011-07-01 13:37:07 -070014#include "shill/dbus_adaptor.h"
Darin Petkovf7897bc2011-06-08 17:13:36 -070015#include "shill/dhcp_provider.h"
Paul Stewart26b327e2011-10-19 11:38:09 -070016#include "shill/event_dispatcher.h"
Chris Masone19e30402011-07-19 15:48:47 -070017#include "shill/mock_control.h"
Darin Petkov98dd6a02011-06-10 15:12:57 -070018#include "shill/mock_dhcp_proxy.h"
Darin Petkovf7897bc2011-06-08 17:13:36 -070019#include "shill/mock_glib.h"
Chris Masone43b48a12011-07-01 13:37:07 -070020#include "shill/property_store_unittest.h"
Darin Petkova7b89492011-07-27 12:48:17 -070021#include "shill/proxy_factory.h"
Darin Petkove7cb7f82011-06-03 13:21:51 -070022
Eric Shienbrood3e20a232012-02-16 11:35:56 -050023using base::Bind;
24using base::Unretained;
Darin Petkove7cb7f82011-06-03 13:21:51 -070025using std::string;
26using std::vector;
Darin Petkovf7897bc2011-06-08 17:13:36 -070027using testing::_;
28using testing::Return;
29using testing::SetArgumentPointee;
Darin Petkove7cb7f82011-06-03 13:21:51 -070030using testing::Test;
31
32namespace shill {
33
Darin Petkov92c43902011-06-09 20:46:06 -070034namespace {
Darin Petkova7b89492011-07-27 12:48:17 -070035const char kDeviceName[] = "eth0";
Paul Stewartd32f4842012-01-11 16:08:13 -080036const char kHostName[] = "hostname";
Paul Stewartd408fdf2012-05-07 17:15:57 -070037const char kLeaseFileSuffix[] = "leasefilesuffix";
38const bool kArpGateway = true;
Darin Petkov92c43902011-06-09 20:46:06 -070039} // namespace {}
40
Chris Masone43b48a12011-07-01 13:37:07 -070041class DHCPConfigTest : public PropertyStoreTest {
Darin Petkove7cb7f82011-06-03 13:21:51 -070042 public:
Darin Petkovf7897bc2011-06-08 17:13:36 -070043 DHCPConfigTest()
Darin Petkovf65e9282011-06-21 14:29:56 -070044 : proxy_(new MockDHCPProxy()),
Darin Petkova7b89492011-07-27 12:48:17 -070045 proxy_factory_(this),
Chris Masone19e30402011-07-19 15:48:47 -070046 config_(new DHCPConfig(&control_,
Chris Masone2176a882011-09-14 22:29:15 -070047 dispatcher(),
Chris Masone19e30402011-07-19 15:48:47 -070048 DHCPProvider::GetInstance(),
Darin Petkov92c43902011-06-09 20:46:06 -070049 kDeviceName,
Paul Stewartd32f4842012-01-11 16:08:13 -080050 kHostName,
Paul Stewartd408fdf2012-05-07 17:15:57 -070051 kLeaseFileSuffix,
52 kArpGateway,
Chris Masone2176a882011-09-14 22:29:15 -070053 glib())) {}
Darin Petkova7b89492011-07-27 12:48:17 -070054
55 virtual void SetUp() {
Darin Petkovab565bb2011-10-06 02:55:51 -070056 config_->proxy_factory_ = &proxy_factory_;
Darin Petkova7b89492011-07-27 12:48:17 -070057 }
58
59 virtual void TearDown() {
Darin Petkovab565bb2011-10-06 02:55:51 -070060 config_->proxy_factory_ = NULL;
Darin Petkov98dd6a02011-06-10 15:12:57 -070061 }
Darin Petkove7cb7f82011-06-03 13:21:51 -070062
Paul Stewartd408fdf2012-05-07 17:15:57 -070063 DHCPConfigRefPtr CreateRunningConfig(const string &hostname,
64 const string &lease_suffix,
65 bool arp_gateway);
66 void StopRunningConfigAndExpect(DHCPConfigRefPtr config,
67 bool lease_file_exists);
68
Darin Petkove7cb7f82011-06-03 13:21:51 -070069 protected:
Darin Petkova7b89492011-07-27 12:48:17 -070070 class TestProxyFactory : public ProxyFactory {
71 public:
Paul Stewart7355ce12011-09-02 10:47:01 -070072 explicit TestProxyFactory(DHCPConfigTest *test) : test_(test) {}
Darin Petkova7b89492011-07-27 12:48:17 -070073
mukesh agrawal1830fa12011-09-26 14:31:40 -070074 virtual DHCPProxyInterface *CreateDHCPProxy(const string &/*service*/) {
Darin Petkova7b89492011-07-27 12:48:17 -070075 return test_->proxy_.release();
76 }
77
78 private:
79 DHCPConfigTest *test_;
80 };
81
Paul Stewartd408fdf2012-05-07 17:15:57 -070082 static const int kPID;
83 static const unsigned int kTag;
84
85 FilePath lease_file_;
86 FilePath pid_file_;
87 ScopedTempDir temp_dir_;
Darin Petkova7b89492011-07-27 12:48:17 -070088 scoped_ptr<MockDHCPProxy> proxy_;
89 TestProxyFactory proxy_factory_;
Chris Masone19e30402011-07-19 15:48:47 -070090 MockControl control_;
Darin Petkovf7897bc2011-06-08 17:13:36 -070091 DHCPConfigRefPtr config_;
Darin Petkove7cb7f82011-06-03 13:21:51 -070092};
93
Paul Stewartd408fdf2012-05-07 17:15:57 -070094const int DHCPConfigTest::kPID = 123456;
95const unsigned int DHCPConfigTest::kTag = 77;
96
97DHCPConfigRefPtr DHCPConfigTest::CreateRunningConfig(const string &hostname,
98 const string &lease_suffix,
99 bool arp_gateway) {
100 DHCPConfigRefPtr config(new DHCPConfig(&control_,
101 dispatcher(),
102 DHCPProvider::GetInstance(),
103 kDeviceName,
104 hostname,
105 lease_suffix,
106 arp_gateway,
107 glib()));
108 EXPECT_CALL(*glib(), SpawnAsync(_, _, _, _, _, _, _, _))
109 .WillOnce(DoAll(SetArgumentPointee<6>(kPID), Return(true)));
110 EXPECT_CALL(*glib(), ChildWatchAdd(kPID, _, _)).WillOnce(Return(kTag));
111 EXPECT_TRUE(config->Start());
112 EXPECT_EQ(kPID, config->pid_);
113 EXPECT_EQ(config.get(), DHCPProvider::GetInstance()->GetConfig(kPID).get());
114 EXPECT_EQ(kTag, config->child_watch_tag_);
115
116 EXPECT_TRUE(temp_dir_.CreateUniqueTempDir());
117 config->root_ = temp_dir_.path();
118 FilePath varrun = temp_dir_.path().Append("var/run");
119 EXPECT_TRUE(file_util::CreateDirectory(varrun));
120 pid_file_ = varrun.Append(base::StringPrintf("dhcpcd-%s.pid", kDeviceName));
121 FilePath varlib = temp_dir_.path().Append("var/lib/dhcpcd");
122 EXPECT_TRUE(file_util::CreateDirectory(varlib));
123 lease_file_ =
124 varlib.Append(base::StringPrintf("dhcpcd-%s.lease", kDeviceName));
125 EXPECT_EQ(0, file_util::WriteFile(pid_file_, "", 0));
126 EXPECT_EQ(0, file_util::WriteFile(lease_file_, "", 0));
127 EXPECT_TRUE(file_util::PathExists(pid_file_));
128 EXPECT_TRUE(file_util::PathExists(lease_file_));
129
130 return config;
131}
132
133void DHCPConfigTest::StopRunningConfigAndExpect(DHCPConfigRefPtr config,
134 bool lease_file_exists) {
135 EXPECT_CALL(*glib(), SpawnClosePID(kPID)).Times(1);
136 DHCPConfig::ChildWatchCallback(kPID, 0, config.get());
137 EXPECT_EQ(NULL, DHCPProvider::GetInstance()->GetConfig(kPID).get());
138
139 EXPECT_FALSE(file_util::PathExists(pid_file_));
140 EXPECT_EQ(lease_file_exists, file_util::PathExists(lease_file_));
141}
142
Darin Petkove7cb7f82011-06-03 13:21:51 -0700143TEST_F(DHCPConfigTest, GetIPv4AddressString) {
Darin Petkovf7897bc2011-06-08 17:13:36 -0700144 EXPECT_EQ("255.255.255.255", config_->GetIPv4AddressString(0xffffffff));
145 EXPECT_EQ("0.0.0.0", config_->GetIPv4AddressString(0));
146 EXPECT_EQ("1.2.3.4", config_->GetIPv4AddressString(0x04030201));
Darin Petkove7cb7f82011-06-03 13:21:51 -0700147}
148
Darin Petkova7b89492011-07-27 12:48:17 -0700149TEST_F(DHCPConfigTest, InitProxy) {
150 static const char kService[] = ":1.200";
Darin Petkova7b89492011-07-27 12:48:17 -0700151 EXPECT_TRUE(proxy_.get());
152 EXPECT_FALSE(config_->proxy_.get());
Eric Shienbrood9a245532012-03-07 14:20:39 -0500153 config_->InitProxy(kService);
Darin Petkova7b89492011-07-27 12:48:17 -0700154 EXPECT_FALSE(proxy_.get());
155 EXPECT_TRUE(config_->proxy_.get());
156
157 config_->InitProxy(kService);
Darin Petkova7b89492011-07-27 12:48:17 -0700158}
159
Darin Petkove7cb7f82011-06-03 13:21:51 -0700160TEST_F(DHCPConfigTest, ParseConfiguration) {
161 DHCPConfig::Configuration conf;
162 conf[DHCPConfig::kConfigurationKeyIPAddress].writer().append_uint32(
163 0x01020304);
164 conf[DHCPConfig::kConfigurationKeySubnetCIDR].writer().append_byte(
165 16);
166 conf[DHCPConfig::kConfigurationKeyBroadcastAddress].writer().append_uint32(
167 0x10203040);
168 {
Darin Petkove7cb7f82011-06-03 13:21:51 -0700169 vector<unsigned int> routers;
170 routers.push_back(0x02040608);
171 routers.push_back(0x03050709);
Darin Petkovf7897bc2011-06-08 17:13:36 -0700172 DBus::MessageIter writer =
173 conf[DHCPConfig::kConfigurationKeyRouters].writer();
Darin Petkove7cb7f82011-06-03 13:21:51 -0700174 writer << routers;
Darin Petkove7cb7f82011-06-03 13:21:51 -0700175 }
176 {
Darin Petkove7cb7f82011-06-03 13:21:51 -0700177 vector<unsigned int> dns;
178 dns.push_back(0x09070503);
179 dns.push_back(0x08060402);
Darin Petkovf7897bc2011-06-08 17:13:36 -0700180 DBus::MessageIter writer = conf[DHCPConfig::kConfigurationKeyDNS].writer();
Darin Petkove7cb7f82011-06-03 13:21:51 -0700181 writer << dns;
Darin Petkove7cb7f82011-06-03 13:21:51 -0700182 }
183 conf[DHCPConfig::kConfigurationKeyDomainName].writer().append_string(
184 "domain-name");
185 {
Darin Petkove7cb7f82011-06-03 13:21:51 -0700186 vector<string> search;
187 search.push_back("foo.com");
188 search.push_back("bar.com");
Darin Petkovf7897bc2011-06-08 17:13:36 -0700189 DBus::MessageIter writer =
190 conf[DHCPConfig::kConfigurationKeyDomainSearch].writer();
Darin Petkove7cb7f82011-06-03 13:21:51 -0700191 writer << search;
Darin Petkove7cb7f82011-06-03 13:21:51 -0700192 }
193 conf[DHCPConfig::kConfigurationKeyMTU].writer().append_uint16(600);
194 conf["UnknownKey"] = DBus::Variant();
195
Darin Petkove7cb7f82011-06-03 13:21:51 -0700196 IPConfig::Properties properties;
Darin Petkovf7897bc2011-06-08 17:13:36 -0700197 ASSERT_TRUE(config_->ParseConfiguration(conf, &properties));
Darin Petkove7cb7f82011-06-03 13:21:51 -0700198 EXPECT_EQ("4.3.2.1", properties.address);
Paul Stewart48100b02012-03-19 07:53:52 -0700199 EXPECT_EQ(16, properties.subnet_prefix);
Darin Petkove7cb7f82011-06-03 13:21:51 -0700200 EXPECT_EQ("64.48.32.16", properties.broadcast_address);
201 EXPECT_EQ("8.6.4.2", properties.gateway);
202 ASSERT_EQ(2, properties.dns_servers.size());
203 EXPECT_EQ("3.5.7.9", properties.dns_servers[0]);
204 EXPECT_EQ("2.4.6.8", properties.dns_servers[1]);
205 EXPECT_EQ("domain-name", properties.domain_name);
206 ASSERT_EQ(2, properties.domain_search.size());
207 EXPECT_EQ("foo.com", properties.domain_search[0]);
208 EXPECT_EQ("bar.com", properties.domain_search[1]);
209 EXPECT_EQ(600, properties.mtu);
210}
211
Darin Petkov92c43902011-06-09 20:46:06 -0700212TEST_F(DHCPConfigTest, StartFail) {
Chris Masone2176a882011-09-14 22:29:15 -0700213 EXPECT_CALL(*glib(), SpawnAsync(_, _, _, _, _, _, _, _))
Darin Petkovf7897bc2011-06-08 17:13:36 -0700214 .WillOnce(Return(false));
Chris Masone2176a882011-09-14 22:29:15 -0700215 EXPECT_CALL(*glib(), ChildWatchAdd(_, _, _)).Times(0);
Darin Petkovf7897bc2011-06-08 17:13:36 -0700216 EXPECT_FALSE(config_->Start());
217 EXPECT_EQ(0, config_->pid_);
Darin Petkov92c43902011-06-09 20:46:06 -0700218}
Darin Petkovf7897bc2011-06-08 17:13:36 -0700219
Paul Stewartd408fdf2012-05-07 17:15:57 -0700220MATCHER_P3(IsDHCPCDArgs, has_hostname, has_arp_gateway, has_lease_suffix, "") {
Paul Stewartd32f4842012-01-11 16:08:13 -0800221 if (string(arg[0]) != "/sbin/dhcpcd" ||
Paul Stewartd408fdf2012-05-07 17:15:57 -0700222 string(arg[1]) != "-B") {
Paul Stewartd32f4842012-01-11 16:08:13 -0800223 return false;
224 }
225
Paul Stewartd408fdf2012-05-07 17:15:57 -0700226 int end_offset = 2;
Paul Stewartd32f4842012-01-11 16:08:13 -0800227 if (has_hostname) {
Paul Stewartd408fdf2012-05-07 17:15:57 -0700228 if (string(arg[end_offset]) != "-h" ||
229 string(arg[end_offset + 1]) != kHostName) {
Paul Stewartd32f4842012-01-11 16:08:13 -0800230 return false;
231 }
Paul Stewartd408fdf2012-05-07 17:15:57 -0700232 end_offset += 2;
Paul Stewartd32f4842012-01-11 16:08:13 -0800233 }
234
Paul Stewartd408fdf2012-05-07 17:15:57 -0700235 if (has_arp_gateway) {
236 if (string(arg[end_offset]) != "-R")
237 return false;
238 ++end_offset;
239 }
240
241 string device_arg = has_lease_suffix ?
242 string(kDeviceName) + "=" + string(kLeaseFileSuffix) : kDeviceName;
243 return string(arg[end_offset]) == device_arg && arg[end_offset + 1] == NULL;
Paul Stewartd32f4842012-01-11 16:08:13 -0800244}
245
246TEST_F(DHCPConfigTest, StartWithHostname) {
Paul Stewartd408fdf2012-05-07 17:15:57 -0700247 EXPECT_CALL(*glib(),
248 SpawnAsync(_, IsDHCPCDArgs(true, true, true), _, _, _, _, _, _))
Paul Stewartd32f4842012-01-11 16:08:13 -0800249 .WillOnce(Return(false));
250 EXPECT_FALSE(config_->Start());
251}
252
253TEST_F(DHCPConfigTest, StartWithoutHostname) {
254 DHCPConfigRefPtr config(new DHCPConfig(&control_,
255 dispatcher(),
256 DHCPProvider::GetInstance(),
257 kDeviceName,
258 "",
Paul Stewartd408fdf2012-05-07 17:15:57 -0700259 kLeaseFileSuffix,
260 kArpGateway,
Paul Stewartd32f4842012-01-11 16:08:13 -0800261 glib()));
262
Paul Stewartd408fdf2012-05-07 17:15:57 -0700263 EXPECT_CALL(*glib(),
264 SpawnAsync(_, IsDHCPCDArgs(false, true, true), _, _, _, _, _, _))
265 .WillOnce(Return(false));
266 EXPECT_FALSE(config->Start());
267}
268
269TEST_F(DHCPConfigTest, StartWithoutArpGateway) {
270 DHCPConfigRefPtr config(new DHCPConfig(&control_,
271 dispatcher(),
272 DHCPProvider::GetInstance(),
273 kDeviceName,
274 kHostName,
275 kLeaseFileSuffix,
276 false,
277 glib()));
278
279 EXPECT_CALL(*glib(),
280 SpawnAsync(_, IsDHCPCDArgs(true, false, true), _, _, _, _, _, _))
281 .WillOnce(Return(false));
282 EXPECT_FALSE(config->Start());
283}
284
285TEST_F(DHCPConfigTest, StartWithoutLeaseSuffix) {
286 DHCPConfigRefPtr config(new DHCPConfig(&control_,
287 dispatcher(),
288 DHCPProvider::GetInstance(),
289 kDeviceName,
290 kHostName,
291 kDeviceName,
292 kArpGateway,
293 glib()));
294
295 EXPECT_CALL(*glib(),
296 SpawnAsync(_, IsDHCPCDArgs(true, true, false), _, _, _, _, _, _))
Paul Stewartd32f4842012-01-11 16:08:13 -0800297 .WillOnce(Return(false));
298 EXPECT_FALSE(config->Start());
299}
300
Darin Petkovf9b0ca82011-06-20 12:10:23 -0700301namespace {
302
303class UpdateCallbackTest {
304 public:
305 UpdateCallbackTest(const string &message,
Chris Masone2b105542011-06-22 10:58:09 -0700306 const IPConfigRefPtr &ipconfig,
Darin Petkovf9b0ca82011-06-20 12:10:23 -0700307 bool success)
308 : message_(message),
309 ipconfig_(ipconfig),
310 success_(success),
311 called_(false) {}
312
Chris Masone2b105542011-06-22 10:58:09 -0700313 void Callback(const IPConfigRefPtr &ipconfig, bool success) {
Darin Petkovf9b0ca82011-06-20 12:10:23 -0700314 called_ = true;
315 EXPECT_EQ(ipconfig_.get(), ipconfig.get()) << message_;
316 EXPECT_EQ(success_, success) << message_;
317 }
318
319 bool called() const { return called_; }
320
321 private:
322 const string message_;
323 IPConfigRefPtr ipconfig_;
324 bool success_;
325 bool called_;
326};
327
328} // namespace {}
329
330TEST_F(DHCPConfigTest, ProcessEventSignalFail) {
331 DHCPConfig::Configuration conf;
332 conf[DHCPConfig::kConfigurationKeyIPAddress].writer().append_uint32(
333 0x01020304);
334 UpdateCallbackTest callback_test(DHCPConfig::kReasonFail, config_, false);
335 config_->RegisterUpdateCallback(
Eric Shienbrood3e20a232012-02-16 11:35:56 -0500336 Bind(&UpdateCallbackTest::Callback, Unretained(&callback_test)));
Darin Petkovf9b0ca82011-06-20 12:10:23 -0700337 config_->ProcessEventSignal(DHCPConfig::kReasonFail, conf);
338 EXPECT_TRUE(callback_test.called());
339 EXPECT_TRUE(config_->properties().address.empty());
340}
341
342TEST_F(DHCPConfigTest, ProcessEventSignalSuccess) {
343 static const char * const kReasons[] = {
344 DHCPConfig::kReasonBound,
345 DHCPConfig::kReasonRebind,
346 DHCPConfig::kReasonReboot,
347 DHCPConfig::kReasonRenew
348 };
349 for (size_t r = 0; r < arraysize(kReasons); r++) {
350 DHCPConfig::Configuration conf;
351 string message = string(kReasons[r]) + " failed";
352 conf[DHCPConfig::kConfigurationKeyIPAddress].writer().append_uint32(r);
353 UpdateCallbackTest callback_test(message, config_, true);
354 config_->RegisterUpdateCallback(
Eric Shienbrood3e20a232012-02-16 11:35:56 -0500355 Bind(&UpdateCallbackTest::Callback, Unretained(&callback_test)));
Darin Petkovf9b0ca82011-06-20 12:10:23 -0700356 config_->ProcessEventSignal(kReasons[r], conf);
357 EXPECT_TRUE(callback_test.called()) << message;
Paul Stewart83224402011-11-30 14:52:30 -0800358 EXPECT_EQ(base::StringPrintf("%zu.0.0.0", r), config_->properties().address)
Darin Petkovf9b0ca82011-06-20 12:10:23 -0700359 << message;
360 }
361}
362
363TEST_F(DHCPConfigTest, ProcessEventSignalUnknown) {
364 DHCPConfig::Configuration conf;
365 conf[DHCPConfig::kConfigurationKeyIPAddress].writer().append_uint32(
366 0x01020304);
367 static const char kReasonUnknown[] = "UNKNOWN_REASON";
368 UpdateCallbackTest callback_test(kReasonUnknown, config_, false);
369 config_->RegisterUpdateCallback(
Eric Shienbrood3e20a232012-02-16 11:35:56 -0500370 Bind(&UpdateCallbackTest::Callback, Unretained(&callback_test)));
Darin Petkovf9b0ca82011-06-20 12:10:23 -0700371 config_->ProcessEventSignal(kReasonUnknown, conf);
372 EXPECT_FALSE(callback_test.called());
373 EXPECT_TRUE(config_->properties().address.empty());
374}
375
376
Darin Petkov98dd6a02011-06-10 15:12:57 -0700377TEST_F(DHCPConfigTest, ReleaseIP) {
378 config_->pid_ = 1 << 18; // Ensure unknown positive PID.
Darin Petkovaceede32011-07-18 15:32:38 -0700379 EXPECT_CALL(*proxy_, Release(kDeviceName)).Times(1);
Darin Petkova7b89492011-07-27 12:48:17 -0700380 config_->proxy_.reset(proxy_.release());
Darin Petkov98dd6a02011-06-10 15:12:57 -0700381 EXPECT_TRUE(config_->ReleaseIP());
382 config_->pid_ = 0;
383}
384
385TEST_F(DHCPConfigTest, RenewIP) {
386 config_->pid_ = 456;
Darin Petkovaceede32011-07-18 15:32:38 -0700387 EXPECT_CALL(*proxy_, Rebind(kDeviceName)).Times(1);
Darin Petkova7b89492011-07-27 12:48:17 -0700388 config_->proxy_.reset(proxy_.release());
Darin Petkov98dd6a02011-06-10 15:12:57 -0700389 EXPECT_TRUE(config_->RenewIP());
390 config_->pid_ = 0;
391}
392
393TEST_F(DHCPConfigTest, RequestIP) {
394 config_->pid_ = 567;
Darin Petkovaceede32011-07-18 15:32:38 -0700395 EXPECT_CALL(*proxy_, Rebind(kDeviceName)).Times(1);
Darin Petkova7b89492011-07-27 12:48:17 -0700396 config_->proxy_.reset(proxy_.release());
Darin Petkov98dd6a02011-06-10 15:12:57 -0700397 EXPECT_TRUE(config_->RenewIP());
398 config_->pid_ = 0;
399}
400
401TEST_F(DHCPConfigTest, Restart) {
402 const int kPID1 = 1 << 17; // Ensure unknown positive PID.
403 const int kPID2 = 987;
404 const unsigned int kTag1 = 11;
405 const unsigned int kTag2 = 22;
406 config_->pid_ = kPID1;
407 config_->child_watch_tag_ = kTag1;
408 DHCPProvider::GetInstance()->BindPID(kPID1, config_);
Chris Masone2176a882011-09-14 22:29:15 -0700409 EXPECT_CALL(*glib(), SourceRemove(kTag1)).WillOnce(Return(true));
410 EXPECT_CALL(*glib(), SpawnClosePID(kPID1)).Times(1);
411 EXPECT_CALL(*glib(), SpawnAsync(_, _, _, _, _, _, _, _))
Darin Petkov98dd6a02011-06-10 15:12:57 -0700412 .WillOnce(DoAll(SetArgumentPointee<6>(kPID2), Return(true)));
Chris Masone2176a882011-09-14 22:29:15 -0700413 EXPECT_CALL(*glib(), ChildWatchAdd(kPID2, _, _)).WillOnce(Return(kTag2));
Darin Petkov98dd6a02011-06-10 15:12:57 -0700414 EXPECT_TRUE(config_->Restart());
415 EXPECT_EQ(kPID2, config_->pid_);
416 EXPECT_EQ(config_.get(), DHCPProvider::GetInstance()->GetConfig(kPID2).get());
417 EXPECT_EQ(kTag2, config_->child_watch_tag_);
418 DHCPProvider::GetInstance()->UnbindPID(kPID2);
419 config_->pid_ = 0;
420 config_->child_watch_tag_ = 0;
421}
422
423TEST_F(DHCPConfigTest, RestartNoClient) {
424 const int kPID = 777;
425 const unsigned int kTag = 66;
Chris Masone2176a882011-09-14 22:29:15 -0700426 EXPECT_CALL(*glib(), SourceRemove(_)).Times(0);
427 EXPECT_CALL(*glib(), SpawnClosePID(_)).Times(0);
428 EXPECT_CALL(*glib(), SpawnAsync(_, _, _, _, _, _, _, _))
Darin Petkov98dd6a02011-06-10 15:12:57 -0700429 .WillOnce(DoAll(SetArgumentPointee<6>(kPID), Return(true)));
Chris Masone2176a882011-09-14 22:29:15 -0700430 EXPECT_CALL(*glib(), ChildWatchAdd(kPID, _, _)).WillOnce(Return(kTag));
Darin Petkov98dd6a02011-06-10 15:12:57 -0700431 EXPECT_TRUE(config_->Restart());
432 EXPECT_EQ(kPID, config_->pid_);
433 EXPECT_EQ(config_.get(), DHCPProvider::GetInstance()->GetConfig(kPID).get());
434 EXPECT_EQ(kTag, config_->child_watch_tag_);
435 DHCPProvider::GetInstance()->UnbindPID(kPID);
436 config_->pid_ = 0;
437 config_->child_watch_tag_ = 0;
438}
439
Paul Stewartd408fdf2012-05-07 17:15:57 -0700440TEST_F(DHCPConfigTest, StartSuccessEphemeral) {
441 DHCPConfigRefPtr config =
442 CreateRunningConfig(kHostName, kDeviceName, kArpGateway);
443 StopRunningConfigAndExpect(config, false);
444}
Darin Petkov92c43902011-06-09 20:46:06 -0700445
Paul Stewartd408fdf2012-05-07 17:15:57 -0700446TEST_F(DHCPConfigTest, StartSuccessPersistent) {
447 DHCPConfigRefPtr config =
448 CreateRunningConfig(kHostName, kLeaseFileSuffix, kArpGateway);
449 StopRunningConfigAndExpect(config, true);
Darin Petkovf7897bc2011-06-08 17:13:36 -0700450}
451
Darin Petkov98dd6a02011-06-10 15:12:57 -0700452TEST_F(DHCPConfigTest, Stop) {
453 // Ensure no crashes.
454 const int kPID = 1 << 17; // Ensure unknown positive PID.
455 config_->Stop();
456 config_->pid_ = kPID;
457 config_->Stop();
Chris Masone2176a882011-09-14 22:29:15 -0700458 EXPECT_CALL(*glib(), SpawnClosePID(kPID)).Times(1); // Invoked by destructor.
Darin Petkov98dd6a02011-06-10 15:12:57 -0700459}
460
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800461TEST_F(DHCPConfigTest, SetProperty) {
Chris Masone43b48a12011-07-01 13:37:07 -0700462 ::DBus::Error error;
463 // Ensure that an attempt to write a R/O property returns InvalidArgs error.
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800464 EXPECT_FALSE(DBusAdaptor::SetProperty(config_->mutable_store(),
465 flimflam::kAddressProperty,
466 PropertyStoreTest::kStringV,
467 &error));
Chris Masone9d779932011-08-25 16:33:41 -0700468 EXPECT_EQ(invalid_args(), error.name());
Chris Masone43b48a12011-07-01 13:37:07 -0700469}
470
Darin Petkove7cb7f82011-06-03 13:21:51 -0700471} // namespace shill