blob: 66c2afa32ac0214433650f81a3123304abe6fb4e [file] [log] [blame]
Arman Uguray2717a102013-01-29 23:36:06 -08001// Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
Chris Masone3bd3c8c2011-06-13 08:20:26 -07002// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "shill/service.h"
6
7#include <map>
8#include <string>
9#include <vector>
10
Eric Shienbrood9a245532012-03-07 14:20:39 -050011#include <base/bind.h>
Chris Masone3bd3c8c2011-06-13 08:20:26 -070012#include <chromeos/dbus/service_constants.h>
mukesh agrawal1830fa12011-09-26 14:31:40 -070013#include <dbus-c++/dbus.h>
Chris Masone3bd3c8c2011-06-13 08:20:26 -070014#include <gtest/gtest.h>
15#include <gmock/gmock.h>
16
17#include "shill/dbus_adaptor.h"
18#include "shill/ethernet_service.h"
Paul Stewart26b327e2011-10-19 11:38:09 -070019#include "shill/event_dispatcher.h"
Chris Masone3bd3c8c2011-06-13 08:20:26 -070020#include "shill/manager.h"
Chris Masone95207da2011-06-29 16:50:49 -070021#include "shill/mock_adaptors.h"
Chris Masone3bd3c8c2011-06-13 08:20:26 -070022#include "shill/mock_control.h"
Paul Stewart10241e32012-04-23 18:15:06 -070023#include "shill/mock_connection.h"
24#include "shill/mock_device_info.h"
Darin Petkov385b9bc2012-12-03 15:25:05 +010025#include "shill/mock_diagnostics_reporter.h"
Paul Stewartc43cbbe2013-04-11 06:29:30 -070026#include "shill/mock_eap_credentials.h"
Christopher Wiley0801d192012-09-24 11:57:15 -070027#include "shill/mock_event_dispatcher.h"
Paul Stewartbc6e7392012-05-24 07:07:48 -070028#include "shill/mock_log.h"
Paul Stewart03dba0b2011-08-22 16:32:45 -070029#include "shill/mock_manager.h"
Darin Petkovcb0b5662012-12-13 09:59:44 +010030#include "shill/mock_power_manager.h"
Paul Stewartff14b022012-04-24 20:06:23 -070031#include "shill/mock_profile.h"
Darin Petkovcb0b5662012-12-13 09:59:44 +010032#include "shill/mock_proxy_factory.h"
Darin Petkovba40dd32011-07-11 20:06:39 -070033#include "shill/mock_store.h"
Darin Petkov385b9bc2012-12-03 15:25:05 +010034#include "shill/mock_time.h"
Chris Masone3bd3c8c2011-06-13 08:20:26 -070035#include "shill/property_store_unittest.h"
mukesh agrawalcbfb34e2013-04-17 19:33:25 -070036#include "shill/service_property_change_test.h"
Chris Masone6515aab2011-10-12 16:19:09 -070037#include "shill/service_under_test.h"
Chris Masone3bd3c8c2011-06-13 08:20:26 -070038
Eric Shienbrood9a245532012-03-07 14:20:39 -050039using base::Bind;
40using base::Unretained;
Darin Petkov385b9bc2012-12-03 15:25:05 +010041using std::deque;
Chris Masone3bd3c8c2011-06-13 08:20:26 -070042using std::map;
43using std::string;
44using std::vector;
Darin Petkovba40dd32011-07-11 20:06:39 -070045using testing::_;
mukesh agrawalcf24a242012-05-21 16:46:11 -070046using testing::AnyNumber;
Darin Petkovba40dd32011-07-11 20:06:39 -070047using testing::AtLeast;
Darin Petkov0c65bdd2012-12-05 13:42:41 +010048using testing::DefaultValue;
Paul Stewartd8ad3c42012-01-09 12:39:38 -080049using testing::DoAll;
Paul Stewartbc6e7392012-05-24 07:07:48 -070050using testing::HasSubstr;
Paul Stewart81426132012-05-16 10:05:10 -070051using testing::Mock;
Darin Petkovba40dd32011-07-11 20:06:39 -070052using testing::NiceMock;
53using testing::Return;
Paul Stewart10241e32012-04-23 18:15:06 -070054using testing::ReturnRef;
Darin Petkovba40dd32011-07-11 20:06:39 -070055using testing::StrictMock;
Paul Stewartd8ad3c42012-01-09 12:39:38 -080056using testing::SetArgumentPointee;
Darin Petkovba40dd32011-07-11 20:06:39 -070057using testing::Test;
Paul Stewart9f32d192012-01-30 20:37:50 -080058using testing::Values;
Chris Masone3bd3c8c2011-06-13 08:20:26 -070059
60namespace shill {
61
62class ServiceTest : public PropertyStoreTest {
63 public:
Chris Masoneb925cc82011-06-22 15:39:57 -070064 ServiceTest()
Thieu Le3426c8f2012-01-11 17:35:11 -080065 : mock_manager_(control_interface(), dispatcher(), metrics(), glib()),
Chris Masone2176a882011-09-14 22:29:15 -070066 service_(new ServiceUnderTest(control_interface(),
67 dispatcher(),
Thieu Le3426c8f2012-01-11 17:35:11 -080068 metrics(),
Paul Stewart03dba0b2011-08-22 16:32:45 -070069 &mock_manager_)),
mukesh agrawal43970a22013-02-15 16:00:07 -080070 service2_(new ServiceUnderTest(control_interface(),
71 dispatcher(),
72 metrics(),
73 &mock_manager_)),
Darin Petkovcb0b5662012-12-13 09:59:44 +010074 storage_id_(ServiceUnderTest::kStorageId),
Paul Stewartc43cbbe2013-04-11 06:29:30 -070075 power_manager_(new MockPowerManager(NULL, &proxy_factory_)),
76 eap_(new MockEapCredentials()) {
Darin Petkov385b9bc2012-12-03 15:25:05 +010077 service_->time_ = &time_;
Darin Petkov0c65bdd2012-12-05 13:42:41 +010078 DefaultValue<Timestamp>::Set(Timestamp());
Darin Petkov385b9bc2012-12-03 15:25:05 +010079 service_->diagnostics_reporter_ = &diagnostics_reporter_;
Paul Stewartc43cbbe2013-04-11 06:29:30 -070080 service_->eap_.reset(eap_); // Passes ownership.
Darin Petkovcb0b5662012-12-13 09:59:44 +010081 mock_manager_.running_ = true;
82 mock_manager_.set_power_manager(power_manager_); // Passes ownership.
Chris Masone9d779932011-08-25 16:33:41 -070083 }
Chris Masoneb925cc82011-06-22 15:39:57 -070084
Chris Masone3bd3c8c2011-06-13 08:20:26 -070085 virtual ~ServiceTest() {}
Chris Masoneb925cc82011-06-22 15:39:57 -070086
Eric Shienbrood9a245532012-03-07 14:20:39 -050087 MOCK_METHOD1(TestCallback, void(const Error &error));
88
Chris Masoneb925cc82011-06-22 15:39:57 -070089 protected:
mukesh agrawalcf24a242012-05-21 16:46:11 -070090 typedef scoped_refptr<MockProfile> MockProfileRefPtr;
Eric Shienbrood9a245532012-03-07 14:20:39 -050091
Darin Petkovcb0b5662012-12-13 09:59:44 +010092 class TestProxyFactory : public ProxyFactory {
93 public:
94 TestProxyFactory() {}
95
96 virtual PowerManagerProxyInterface *CreatePowerManagerProxy(
97 PowerManagerProxyDelegate *delegate) {
98 return NULL;
99 }
100
101 private:
102 DISALLOW_COPY_AND_ASSIGN(TestProxyFactory);
103 };
104
Darin Petkovaba89322013-03-11 14:48:22 +0100105 ServiceMockAdaptor *GetAdaptor() {
106 return dynamic_cast<ServiceMockAdaptor *>(service_->adaptor());
107 }
108
Darin Petkov457728b2013-01-09 09:49:08 +0100109 string GetFriendlyName() { return service_->friendly_name(); }
110
Darin Petkovcb0b5662012-12-13 09:59:44 +0100111 void SetManagerRunning(bool running) { mock_manager_.running_ = running; }
112
113 void SetPowerState(PowerManager::SuspendState state) {
114 power_manager_->power_state_ = state;
115 }
116
Darin Petkov385b9bc2012-12-03 15:25:05 +0100117 void SetExplicitlyDisconnected(bool explicitly) {
118 service_->explicitly_disconnected_ = explicitly;
119 }
120
121 void SetStateField(Service::ConnectState state) { service_->state_ = state; }
122
Darin Petkovc8d91e52013-01-21 11:43:47 +0100123 Service::ConnectState GetPreviousState() const {
124 return service_->previous_state_;
125 }
126
Darin Petkov385b9bc2012-12-03 15:25:05 +0100127 void NoteDisconnectEvent() {
128 service_->NoteDisconnectEvent();
129 }
130
Darin Petkov0c65bdd2012-12-05 13:42:41 +0100131 deque<Timestamp> *GetDisconnects() {
132 return &service_->disconnects_;
133 }
134 deque<Timestamp> *GetMisconnects() {
135 return &service_->misconnects_;
136 }
137
138 Timestamp GetTimestamp(int monotonic_seconds, const string &wall_clock) {
139 struct timeval monotonic = { .tv_sec = monotonic_seconds, .tv_usec = 0 };
140 return Timestamp(monotonic, wall_clock);
141 }
142
143 void PushTimestamp(deque<Timestamp> *timestamps,
144 int monotonic_seconds,
145 const string &wall_clock) {
146 timestamps->push_back(GetTimestamp(monotonic_seconds, wall_clock));
147 }
Darin Petkov385b9bc2012-12-03 15:25:05 +0100148
149 int GetDisconnectsMonitorSeconds() {
150 return Service::kDisconnectsMonitorSeconds;
151 }
152
153 int GetMisconnectsMonitorSeconds() {
154 return Service::kMisconnectsMonitorSeconds;
155 }
156
157 int GetReportDisconnectsThreshold() {
158 return Service::kReportDisconnectsThreshold;
159 }
160
161 int GetReportMisconnectsThreshold() {
162 return Service::kReportMisconnectsThreshold;
163 }
164
165 int GetMaxDisconnectEventHistory() {
166 return Service::kMaxDisconnectEventHistory;
167 }
168
Darin Petkov0c65bdd2012-12-05 13:42:41 +0100169 static Strings ExtractWallClockToStrings(const deque<Timestamp> &timestamps) {
170 return Service::ExtractWallClockToStrings(timestamps);
171 }
172
Darin Petkov36d962d2013-03-25 13:03:14 +0100173 bool GetAutoConnect(Error *error) {
174 return service_->GetAutoConnect(error);
175 }
176
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700177 bool SetAutoConnectFull(bool connect, Error *error) {
178 return service_->SetAutoConnectFull(connect, error);
Darin Petkov36d962d2013-03-25 13:03:14 +0100179 }
180
Paul Stewart03dba0b2011-08-22 16:32:45 -0700181 MockManager mock_manager_;
Darin Petkov385b9bc2012-12-03 15:25:05 +0100182 MockDiagnosticsReporter diagnostics_reporter_;
183 MockTime time_;
Paul Stewart03dba0b2011-08-22 16:32:45 -0700184 scoped_refptr<ServiceUnderTest> service_;
mukesh agrawal43970a22013-02-15 16:00:07 -0800185 scoped_refptr<ServiceUnderTest> service2_;
Chris Masone34af2182011-08-22 11:59:36 -0700186 string storage_id_;
Darin Petkovcb0b5662012-12-13 09:59:44 +0100187 TestProxyFactory proxy_factory_;
188 MockPowerManager *power_manager_; // Owned by |mock_manager_|.
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700189 MockEapCredentials *eap_; // Owned by |service_|.
Chris Masone3bd3c8c2011-06-13 08:20:26 -0700190};
191
Christopher Wiley0801d192012-09-24 11:57:15 -0700192class AllMockServiceTest : public testing::Test {
193 public:
194 AllMockServiceTest()
Thieu Le6c1e3bb2013-02-06 15:20:35 -0800195 : metrics_(&dispatcher_),
196 manager_(&control_interface_, &dispatcher_, &metrics_, &glib_),
Christopher Wiley0801d192012-09-24 11:57:15 -0700197 service_(new ServiceUnderTest(&control_interface_,
198 &dispatcher_,
199 &metrics_,
200 &manager_)) { }
201 virtual ~AllMockServiceTest() {}
202
203 protected:
204 MockControl control_interface_;
205 StrictMock<MockEventDispatcher> dispatcher_;
206 MockGLib glib_;
207 NiceMock<MockMetrics> metrics_;
208 MockManager manager_;
209 scoped_refptr<ServiceUnderTest> service_;
210};
211
Darin Petkovba40dd32011-07-11 20:06:39 -0700212TEST_F(ServiceTest, Constructor) {
213 EXPECT_TRUE(service_->save_credentials_);
214 EXPECT_EQ(Service::kCheckPortalAuto, service_->check_portal_);
Eric Shienbroodcc95c5d2012-03-30 15:25:49 -0400215 EXPECT_EQ(Service::kStateIdle, service_->state());
mukesh agrawalcf24a242012-05-21 16:46:11 -0700216 EXPECT_FALSE(service_->has_ever_connected());
Darin Petkovba40dd32011-07-11 20:06:39 -0700217}
218
Darin Petkov58f0b6d2012-06-12 12:52:30 +0200219TEST_F(ServiceTest, CalculateState) {
220 service_->state_ = Service::kStateConnected;
221 Error error;
222 EXPECT_EQ(flimflam::kStateReady, service_->CalculateState(&error));
223 EXPECT_TRUE(error.IsSuccess());
224}
225
226TEST_F(ServiceTest, CalculateTechnology) {
227 service_->technology_ = Technology::kWifi;
228 Error error;
229 EXPECT_EQ(flimflam::kTypeWifi, service_->CalculateTechnology(&error));
230 EXPECT_TRUE(error.IsSuccess());
231}
232
Chris Masonea8a2c252011-06-27 22:16:30 -0700233TEST_F(ServiceTest, GetProperties) {
234 map<string, ::DBus::Variant> props;
235 Error error(Error::kInvalidProperty, "");
236 {
237 ::DBus::Error dbus_error;
Paul Stewartd215af62012-04-24 23:25:50 -0700238 string expected("true");
mukesh agrawalde29fa82011-09-16 16:16:36 -0700239 service_->mutable_store()->SetStringProperty(flimflam::kCheckPortalProperty,
240 expected,
241 &error);
Chris Masone27c4aa52011-07-02 13:10:14 -0700242 DBusAdaptor::GetProperties(service_->store(), &props, &dbus_error);
Chris Masonea8a2c252011-06-27 22:16:30 -0700243 ASSERT_FALSE(props.find(flimflam::kCheckPortalProperty) == props.end());
244 EXPECT_EQ(props[flimflam::kCheckPortalProperty].reader().get_string(),
245 expected);
246 }
247 {
248 ::DBus::Error dbus_error;
249 bool expected = true;
mukesh agrawalde29fa82011-09-16 16:16:36 -0700250 service_->mutable_store()->SetBoolProperty(flimflam::kAutoConnectProperty,
251 expected,
252 &error);
Chris Masone27c4aa52011-07-02 13:10:14 -0700253 DBusAdaptor::GetProperties(service_->store(), &props, &dbus_error);
Chris Masonea8a2c252011-06-27 22:16:30 -0700254 ASSERT_FALSE(props.find(flimflam::kAutoConnectProperty) == props.end());
255 EXPECT_EQ(props[flimflam::kAutoConnectProperty].reader().get_bool(),
256 expected);
257 }
258 {
259 ::DBus::Error dbus_error;
Chris Masone27c4aa52011-07-02 13:10:14 -0700260 DBusAdaptor::GetProperties(service_->store(), &props, &dbus_error);
Chris Masonea8a2c252011-06-27 22:16:30 -0700261 ASSERT_FALSE(props.find(flimflam::kConnectableProperty) == props.end());
262 EXPECT_EQ(props[flimflam::kConnectableProperty].reader().get_bool(), false);
263 }
264 {
265 ::DBus::Error dbus_error;
266 int32 expected = 127;
mukesh agrawalde29fa82011-09-16 16:16:36 -0700267 service_->mutable_store()->SetInt32Property(flimflam::kPriorityProperty,
268 expected,
269 &error);
Chris Masone27c4aa52011-07-02 13:10:14 -0700270 DBusAdaptor::GetProperties(service_->store(), &props, &dbus_error);
Chris Masonea8a2c252011-06-27 22:16:30 -0700271 ASSERT_FALSE(props.find(flimflam::kPriorityProperty) == props.end());
272 EXPECT_EQ(props[flimflam::kPriorityProperty].reader().get_int32(),
273 expected);
274 }
Chris Masone95207da2011-06-29 16:50:49 -0700275 {
276 ::DBus::Error dbus_error;
Chris Masone27c4aa52011-07-02 13:10:14 -0700277 DBusAdaptor::GetProperties(service_->store(), &props, &dbus_error);
Chris Masone95207da2011-06-29 16:50:49 -0700278 ASSERT_FALSE(props.find(flimflam::kDeviceProperty) == props.end());
Jason Glasgowacdc11f2012-03-30 14:12:22 -0400279 EXPECT_EQ(props[flimflam::kDeviceProperty].reader().get_path(),
Paul Stewart03dba0b2011-08-22 16:32:45 -0700280 string(ServiceUnderTest::kRpcId));
Chris Masone95207da2011-06-29 16:50:49 -0700281 }
Chris Masonea8a2c252011-06-27 22:16:30 -0700282}
Chris Masone3bd3c8c2011-06-13 08:20:26 -0700283
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800284TEST_F(ServiceTest, SetProperty) {
Chris Masonea8a2c252011-06-27 22:16:30 -0700285 {
286 ::DBus::Error error;
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800287 EXPECT_TRUE(DBusAdaptor::SetProperty(service_->mutable_store(),
288 flimflam::kSaveCredentialsProperty,
289 PropertyStoreTest::kBoolV,
290 &error));
Chris Masonea8a2c252011-06-27 22:16:30 -0700291 }
292 {
293 ::DBus::Error error;
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700294 ::DBus::Variant priority;
295 priority.writer().append_int32(1);
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800296 EXPECT_TRUE(DBusAdaptor::SetProperty(service_->mutable_store(),
297 flimflam::kPriorityProperty,
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700298 priority,
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800299 &error));
Chris Masonea8a2c252011-06-27 22:16:30 -0700300 }
301 {
302 ::DBus::Error error;
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700303 ::DBus::Variant guid;
304 guid.writer().append_string("not default");
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800305 EXPECT_TRUE(DBusAdaptor::SetProperty(service_->mutable_store(),
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700306 flimflam::kGuidProperty,
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700307 guid,
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700308 &error));
309 }
310 // Ensure that EAP properties cannot be set on services with no EAP
311 // credentials. Use service2_ here since we're have some code in
312 // ServiceTest::SetUp() that fiddles with service_->eap_.
313 {
314 ::DBus::Error error;
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700315 ::DBus::Variant eap;
316 eap.writer().append_string("eap eep eip!");
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700317 EXPECT_FALSE(DBusAdaptor::SetProperty(service2_->mutable_store(),
318 flimflam::kEAPEAPProperty,
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700319 eap,
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700320 &error));
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700321 ASSERT_TRUE(error.is_set()); // name() may be invalid otherwise
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700322 EXPECT_EQ(invalid_prop(), error.name());
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700323 // Now plumb in eap credentials, and try again.
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700324 service2_->SetEapCredentials(new EapCredentials());
325 EXPECT_TRUE(DBusAdaptor::SetProperty(service2_->mutable_store(),
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800326 flimflam::kEAPEAPProperty,
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700327 eap,
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800328 &error));
Chris Masonea8a2c252011-06-27 22:16:30 -0700329 }
Chris Masoneb925cc82011-06-22 15:39:57 -0700330 // Ensure that an attempt to write a R/O property returns InvalidArgs error.
Chris Masonea8a2c252011-06-27 22:16:30 -0700331 {
332 ::DBus::Error error;
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800333 EXPECT_FALSE(DBusAdaptor::SetProperty(service_->mutable_store(),
334 flimflam::kFavoriteProperty,
335 PropertyStoreTest::kBoolV,
336 &error));
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700337 ASSERT_TRUE(error.is_set()); // name() may be invalid otherwise
Chris Masone9d779932011-08-25 16:33:41 -0700338 EXPECT_EQ(invalid_args(), error.name());
Chris Masonea8a2c252011-06-27 22:16:30 -0700339 }
Thieu Le284fe792012-01-31 17:53:19 -0800340 {
341 ::DBus::Error error;
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700342 ::DBus::Variant auto_connect;
343 auto_connect.writer().append_bool(true);
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800344 EXPECT_TRUE(DBusAdaptor::SetProperty(service_->mutable_store(),
345 flimflam::kAutoConnectProperty,
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700346 auto_connect,
mukesh agrawal6bb9e7c2012-01-30 14:57:54 -0800347 &error));
Thieu Le284fe792012-01-31 17:53:19 -0800348 }
Paul Stewart0c438332012-04-11 07:55:27 -0700349 // Ensure that we can perform a trivial set of the Name property (to its
350 // current value) but an attempt to set the property to a different value
351 // fails.
352 {
353 ::DBus::Error error;
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700354 EXPECT_FALSE(DBusAdaptor::SetProperty(service_->mutable_store(),
355 flimflam::kNameProperty,
356 DBusAdaptor::StringToVariant(
357 GetFriendlyName()),
358 &error));
359 EXPECT_FALSE(error.is_set());
Paul Stewart0c438332012-04-11 07:55:27 -0700360 }
361 {
362 ::DBus::Error error;
363 EXPECT_FALSE(DBusAdaptor::SetProperty(service_->mutable_store(),
364 flimflam::kNameProperty,
365 PropertyStoreTest::kStringV,
366 &error));
mukesh agrawalbebf1b82013-04-23 15:06:33 -0700367 ASSERT_TRUE(error.is_set()); // name() may be invalid otherwise
Paul Stewart0c438332012-04-11 07:55:27 -0700368 EXPECT_EQ(invalid_args(), error.name());
369 }
Chris Masoneb925cc82011-06-22 15:39:57 -0700370}
371
Paul Stewarte7de2942013-04-25 17:07:31 -0700372TEST_F(ServiceTest, GetLoadableStorageIdentifier) {
373 NiceMock<MockStore> storage;
374 EXPECT_CALL(storage, ContainsGroup(storage_id_))
375 .WillOnce(Return(false))
376 .WillOnce(Return(true));
377 EXPECT_EQ("", service_->GetLoadableStorageIdentifier(storage));
378 EXPECT_EQ(storage_id_, service_->GetLoadableStorageIdentifier(storage));
379}
380
381TEST_F(ServiceTest, IsLoadableFrom) {
382 NiceMock<MockStore> storage;
383 EXPECT_CALL(storage, ContainsGroup(storage_id_))
384 .WillOnce(Return(false))
385 .WillOnce(Return(true));
386 EXPECT_FALSE(service_->IsLoadableFrom(storage));
387 EXPECT_TRUE(service_->IsLoadableFrom(storage));
388}
389
Darin Petkovba40dd32011-07-11 20:06:39 -0700390TEST_F(ServiceTest, Load) {
391 NiceMock<MockStore> storage;
Chris Masone34af2182011-08-22 11:59:36 -0700392 EXPECT_CALL(storage, ContainsGroup(storage_id_)).WillOnce(Return(true));
393 EXPECT_CALL(storage, GetString(storage_id_, _, _))
Darin Petkovba40dd32011-07-11 20:06:39 -0700394 .Times(AtLeast(1))
395 .WillRepeatedly(Return(true));
Darin Petkov0debec02013-01-22 10:40:05 +0100396 EXPECT_CALL(storage, GetBool(storage_id_, _, _)).Times(AnyNumber());
397 EXPECT_CALL(storage,
398 GetBool(storage_id_, Service::kStorageSaveCredentials, _));
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700399 EXPECT_CALL(*eap_, Load(&storage, storage_id_));
Chris Masone9d779932011-08-25 16:33:41 -0700400 EXPECT_TRUE(service_->Load(&storage));
Darin Petkovba40dd32011-07-11 20:06:39 -0700401}
402
403TEST_F(ServiceTest, LoadFail) {
404 StrictMock<MockStore> storage;
Chris Masone34af2182011-08-22 11:59:36 -0700405 EXPECT_CALL(storage, ContainsGroup(storage_id_)).WillOnce(Return(false));
Chris Masone9d779932011-08-25 16:33:41 -0700406 EXPECT_FALSE(service_->Load(&storage));
Darin Petkovba40dd32011-07-11 20:06:39 -0700407}
408
409TEST_F(ServiceTest, SaveString) {
410 MockStore storage;
411 static const char kKey[] = "test-key";
412 static const char kData[] = "test-data";
Chris Masone34af2182011-08-22 11:59:36 -0700413 EXPECT_CALL(storage, SetString(storage_id_, kKey, kData))
Darin Petkovba40dd32011-07-11 20:06:39 -0700414 .WillOnce(Return(true));
Chris Masone34af2182011-08-22 11:59:36 -0700415 service_->SaveString(&storage, storage_id_, kKey, kData, false, true);
Darin Petkovba40dd32011-07-11 20:06:39 -0700416}
417
418TEST_F(ServiceTest, SaveStringCrypted) {
419 MockStore storage;
420 static const char kKey[] = "test-key";
421 static const char kData[] = "test-data";
Chris Masone34af2182011-08-22 11:59:36 -0700422 EXPECT_CALL(storage, SetCryptedString(storage_id_, kKey, kData))
Darin Petkovba40dd32011-07-11 20:06:39 -0700423 .WillOnce(Return(true));
Chris Masone34af2182011-08-22 11:59:36 -0700424 service_->SaveString(&storage, storage_id_, kKey, kData, true, true);
Darin Petkovba40dd32011-07-11 20:06:39 -0700425}
426
427TEST_F(ServiceTest, SaveStringDontSave) {
428 MockStore storage;
429 static const char kKey[] = "test-key";
Chris Masone34af2182011-08-22 11:59:36 -0700430 EXPECT_CALL(storage, DeleteKey(storage_id_, kKey))
Darin Petkovba40dd32011-07-11 20:06:39 -0700431 .WillOnce(Return(true));
Chris Masone34af2182011-08-22 11:59:36 -0700432 service_->SaveString(&storage, storage_id_, kKey, "data", false, false);
Darin Petkovba40dd32011-07-11 20:06:39 -0700433}
434
435TEST_F(ServiceTest, SaveStringEmpty) {
436 MockStore storage;
437 static const char kKey[] = "test-key";
Chris Masone34af2182011-08-22 11:59:36 -0700438 EXPECT_CALL(storage, DeleteKey(storage_id_, kKey))
Darin Petkovba40dd32011-07-11 20:06:39 -0700439 .WillOnce(Return(true));
Chris Masone34af2182011-08-22 11:59:36 -0700440 service_->SaveString(&storage, storage_id_, kKey, "", true, true);
Darin Petkovba40dd32011-07-11 20:06:39 -0700441}
442
443TEST_F(ServiceTest, Save) {
444 NiceMock<MockStore> storage;
Chris Masone34af2182011-08-22 11:59:36 -0700445 EXPECT_CALL(storage, SetString(storage_id_, _, _))
Darin Petkovba40dd32011-07-11 20:06:39 -0700446 .Times(AtLeast(1))
447 .WillRepeatedly(Return(true));
Chris Masone34af2182011-08-22 11:59:36 -0700448 EXPECT_CALL(storage, DeleteKey(storage_id_, _))
Darin Petkovba40dd32011-07-11 20:06:39 -0700449 .Times(AtLeast(1))
450 .WillRepeatedly(Return(true));
Darin Petkov0debec02013-01-22 10:40:05 +0100451 EXPECT_CALL(storage, SetBool(storage_id_, _, _)).Times(AnyNumber());
452 EXPECT_CALL(storage,
453 SetBool(storage_id_,
454 Service::kStorageSaveCredentials,
455 service_->save_credentials()));
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700456 EXPECT_CALL(*eap_, Save(&storage, storage_id_, true));
Chris Masone9d779932011-08-25 16:33:41 -0700457 EXPECT_TRUE(service_->Save(&storage));
Darin Petkovba40dd32011-07-11 20:06:39 -0700458}
459
Paul Stewartd8ad3c42012-01-09 12:39:38 -0800460TEST_F(ServiceTest, Unload) {
461 NiceMock<MockStore> storage;
462 EXPECT_CALL(storage, ContainsGroup(storage_id_)).WillOnce(Return(true));
463 static const string string_value("value");
464 EXPECT_CALL(storage, GetString(storage_id_, _, _))
465 .Times(AtLeast(1))
466 .WillRepeatedly(DoAll(SetArgumentPointee<2>(string_value), Return(true)));
Paul Stewart88769de2012-09-21 13:14:36 -0700467 EXPECT_CALL(storage, GetBool(storage_id_, _, _))
468 .Times(AtLeast(1))
469 .WillRepeatedly(DoAll(SetArgumentPointee<2>(true), Return(true)));
470 EXPECT_FALSE(service_->explicitly_disconnected_);
471 service_->explicitly_disconnected_ = true;
472 EXPECT_FALSE(service_->has_ever_connected_);
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700473 EXPECT_CALL(*eap_, Load(&storage, storage_id_));
Paul Stewartd8ad3c42012-01-09 12:39:38 -0800474 ASSERT_TRUE(service_->Load(&storage));
Paul Stewarte7cce8f2012-09-11 10:56:38 -0700475 // TODO(pstew): Only two string properties in the service are tested as
mukesh agrawalcf24a242012-05-21 16:46:11 -0700476 // a sentinel that properties are being set and reset at the right times.
Paul Stewartd8ad3c42012-01-09 12:39:38 -0800477 // However, since property load/store is essentially a manual process,
478 // it is error prone and should either be exhaustively unit-tested or
479 // a generic framework for registering loaded/stored properties should
480 // be created. crosbug.com/24859
481 EXPECT_EQ(string_value, service_->ui_data_);
Paul Stewarte7cce8f2012-09-11 10:56:38 -0700482 EXPECT_EQ(string_value, service_->guid_);
Paul Stewart88769de2012-09-21 13:14:36 -0700483 EXPECT_FALSE(service_->explicitly_disconnected_);
484 EXPECT_TRUE(service_->has_ever_connected_);
485 service_->explicitly_disconnected_ = true;
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700486 EXPECT_CALL(*eap_, Reset());
Paul Stewartd8ad3c42012-01-09 12:39:38 -0800487 service_->Unload();
488 EXPECT_EQ(string(""), service_->ui_data_);
Paul Stewarte7cce8f2012-09-11 10:56:38 -0700489 EXPECT_EQ(string(""), service_->guid_);
Philipp Neubeckf883a7b2012-09-14 19:52:44 +0200490 EXPECT_FALSE(service_->explicitly_disconnected_);
Paul Stewart88769de2012-09-21 13:14:36 -0700491 EXPECT_FALSE(service_->has_ever_connected_);
Paul Stewartd8ad3c42012-01-09 12:39:38 -0800492}
493
Paul Stewart03dba0b2011-08-22 16:32:45 -0700494TEST_F(ServiceTest, State) {
Eric Shienbroodcc95c5d2012-03-30 15:25:49 -0400495 EXPECT_EQ(Service::kStateIdle, service_->state());
Darin Petkovc8d91e52013-01-21 11:43:47 +0100496 EXPECT_EQ(Service::kStateIdle, GetPreviousState());
Paul Stewart03dba0b2011-08-22 16:32:45 -0700497 EXPECT_EQ(Service::kFailureUnknown, service_->failure());
Paul Stewartf2d60912012-07-15 08:37:30 -0700498 const string unknown_error(
499 Service::ConnectFailureToString(Service::kFailureUnknown));
500 EXPECT_EQ(unknown_error, service_->error());
Paul Stewart03dba0b2011-08-22 16:32:45 -0700501
mukesh agrawal00917ce2011-11-22 23:56:55 +0000502 ServiceRefPtr service_ref(service_);
mukesh agrawalf2f68a52011-09-01 12:15:48 -0700503
Darin Petkovaba89322013-03-11 14:48:22 +0100504 EXPECT_CALL(*GetAdaptor(),
Wade Guthriecb094352013-05-08 15:24:59 -0700505 EmitStringChanged(flimflam::kStateProperty, _)).Times(6);
Darin Petkovaba89322013-03-11 14:48:22 +0100506 EXPECT_CALL(*GetAdaptor(),
Paul Stewartf2d60912012-07-15 08:37:30 -0700507 EmitStringChanged(flimflam::kErrorProperty, _)).Times(4);
Paul Stewart03dba0b2011-08-22 16:32:45 -0700508 EXPECT_CALL(mock_manager_, UpdateService(service_ref));
509 service_->SetState(Service::kStateConnected);
Darin Petkovc8d91e52013-01-21 11:43:47 +0100510 EXPECT_EQ(Service::kStateIdle, GetPreviousState());
Paul Stewart03dba0b2011-08-22 16:32:45 -0700511 // A second state change shouldn't cause another update
512 service_->SetState(Service::kStateConnected);
Paul Stewart03dba0b2011-08-22 16:32:45 -0700513 EXPECT_EQ(Service::kStateConnected, service_->state());
Darin Petkovc8d91e52013-01-21 11:43:47 +0100514 EXPECT_EQ(Service::kStateIdle, GetPreviousState());
Paul Stewart03dba0b2011-08-22 16:32:45 -0700515 EXPECT_EQ(Service::kFailureUnknown, service_->failure());
mukesh agrawalcf24a242012-05-21 16:46:11 -0700516 EXPECT_TRUE(service_->has_ever_connected_);
mukesh agrawal568b5c62012-02-28 14:44:47 -0800517
Paul Stewart03dba0b2011-08-22 16:32:45 -0700518 EXPECT_CALL(mock_manager_, UpdateService(service_ref));
Paul Stewart03dba0b2011-08-22 16:32:45 -0700519 service_->SetFailure(Service::kFailureOutOfRange);
mukesh agrawal568b5c62012-02-28 14:44:47 -0800520 EXPECT_TRUE(service_->IsFailed());
521 EXPECT_GT(service_->failed_time_, 0);
Paul Stewart03dba0b2011-08-22 16:32:45 -0700522 EXPECT_EQ(Service::kStateFailure, service_->state());
523 EXPECT_EQ(Service::kFailureOutOfRange, service_->failure());
Paul Stewartf2d60912012-07-15 08:37:30 -0700524 const string out_of_range_error(
525 Service::ConnectFailureToString(Service::kFailureOutOfRange));
526 EXPECT_EQ(out_of_range_error, service_->error());
mukesh agrawal568b5c62012-02-28 14:44:47 -0800527
528 EXPECT_CALL(mock_manager_, UpdateService(service_ref));
529 service_->SetState(Service::kStateConnected);
530 EXPECT_FALSE(service_->IsFailed());
531 EXPECT_EQ(service_->failed_time_, 0);
Paul Stewartf2d60912012-07-15 08:37:30 -0700532 EXPECT_EQ(unknown_error, service_->error());
mukesh agrawal568b5c62012-02-28 14:44:47 -0800533
534 EXPECT_CALL(mock_manager_, UpdateService(service_ref));
535 service_->SetFailureSilent(Service::kFailurePinMissing);
536 EXPECT_TRUE(service_->IsFailed());
537 EXPECT_GT(service_->failed_time_, 0);
538 EXPECT_EQ(Service::kStateIdle, service_->state());
539 EXPECT_EQ(Service::kFailurePinMissing, service_->failure());
Paul Stewartf2d60912012-07-15 08:37:30 -0700540 const string pin_missing_error(
541 Service::ConnectFailureToString(Service::kFailurePinMissing));
542 EXPECT_EQ(pin_missing_error, service_->error());
mukesh agrawalcf24a242012-05-21 16:46:11 -0700543
544 // If the Service has a Profile, the profile should be saved when
545 // the service enters kStateConnected. (The case where the service
546 // doesn't have a profile is tested above.)
547 MockProfileRefPtr mock_profile(
Thieu Le5133b712013-02-19 14:47:21 -0800548 new MockProfile(control_interface(), metrics(), &mock_manager_));
mukesh agrawalcf24a242012-05-21 16:46:11 -0700549 NiceMock<MockStore> storage;
550 service_->set_profile(mock_profile);
551 service_->has_ever_connected_ = false;
552 EXPECT_CALL(mock_manager_, UpdateService(service_ref));
553 EXPECT_CALL(*mock_profile, GetConstStorage())
554 .WillOnce(Return(&storage));
555 EXPECT_CALL(*mock_profile, UpdateService(service_ref));
556 service_->SetState(Service::kStateConnected);
557 EXPECT_TRUE(service_->has_ever_connected_);
558 service_->set_profile(NULL); // Break reference cycle.
559
560 // Similar to the above, but emulate an emphemeral profile, which
561 // has no storage. We can't update the service in the profile, but
562 // we should not crash.
563 service_->state_ = Service::kStateIdle; // Skips state change logic.
564 service_->set_profile(mock_profile);
565 service_->has_ever_connected_ = false;
566 EXPECT_CALL(mock_manager_, UpdateService(service_ref));
567 EXPECT_CALL(*mock_profile, GetConstStorage()).
568 WillOnce(Return(static_cast<StoreInterface *>(NULL)));
569 service_->SetState(Service::kStateConnected);
570 EXPECT_TRUE(service_->has_ever_connected_);
571 service_->set_profile(NULL); // Break reference cycle.
Paul Stewart03dba0b2011-08-22 16:32:45 -0700572}
573
Darin Petkovb100ae72011-08-24 16:19:45 -0700574TEST_F(ServiceTest, ActivateCellularModem) {
Eric Shienbrood9a245532012-03-07 14:20:39 -0500575 ResultCallback callback =
576 Bind(&ServiceTest::TestCallback, Unretained(this));
577 EXPECT_CALL(*this, TestCallback(_)).Times(0);
Darin Petkovb100ae72011-08-24 16:19:45 -0700578 Error error;
Eric Shienbrood9a245532012-03-07 14:20:39 -0500579 service_->ActivateCellularModem("Carrier", &error, callback);
580 EXPECT_TRUE(error.IsFailure());
Darin Petkovb100ae72011-08-24 16:19:45 -0700581}
582
Ben Chan5d924542013-02-14 17:49:08 -0800583TEST_F(ServiceTest, CompleteCellularActivation) {
584 Error error;
585 service_->CompleteCellularActivation(&error);
586 EXPECT_EQ(Error::kNotSupported, error.type());
587}
588
mukesh agrawal00917ce2011-11-22 23:56:55 +0000589TEST_F(ServiceTest, MakeFavorite) {
590 EXPECT_FALSE(service_->favorite());
591 EXPECT_FALSE(service_->auto_connect());
592
593 service_->MakeFavorite();
594 EXPECT_TRUE(service_->favorite());
595 EXPECT_TRUE(service_->auto_connect());
596}
597
598TEST_F(ServiceTest, ReMakeFavorite) {
599 service_->MakeFavorite();
600 EXPECT_TRUE(service_->favorite());
601 EXPECT_TRUE(service_->auto_connect());
602
mukesh agrawalcbfb34e2013-04-17 19:33:25 -0700603 service_->SetAutoConnect(false);
mukesh agrawal00917ce2011-11-22 23:56:55 +0000604 service_->MakeFavorite();
605 EXPECT_TRUE(service_->favorite());
606 EXPECT_FALSE(service_->auto_connect());
607}
608
mukesh agrawal76d13882012-01-12 15:23:11 -0800609TEST_F(ServiceTest, IsAutoConnectable) {
Darin Petkov4cbff5b2013-01-29 16:29:05 +0100610 const char *reason = NULL;
mukesh agrawalcbfb34e2013-04-17 19:33:25 -0700611 service_->SetConnectable(true);
Darin Petkov4cbff5b2013-01-29 16:29:05 +0100612
613 // Services with non-primary connectivity technologies should not auto-connect
614 // when the system is offline.
615 EXPECT_EQ(Technology::kUnknown, service_->technology());
616 EXPECT_CALL(mock_manager_, IsOnline()).WillOnce(Return(false));
617 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
618 EXPECT_STREQ(Service::kAutoConnOffline, reason);
619
620 service_->technology_ = Technology::kEthernet;
mukesh agrawalbf14e942012-03-02 14:36:34 -0800621 EXPECT_TRUE(service_->IsAutoConnectable(&reason));
mukesh agrawal76d13882012-01-12 15:23:11 -0800622
mukesh agrawaladb68482012-01-17 16:31:51 -0800623 // We should not auto-connect to a Service that a user has
624 // deliberately disconnected.
625 Error error;
Christopher Wileyabd3b502012-09-26 13:08:52 -0700626 service_->UserInitiatedDisconnect(&error);
mukesh agrawalbf14e942012-03-02 14:36:34 -0800627 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
628 EXPECT_STREQ(Service::kAutoConnExplicitDisconnect, reason);
mukesh agrawaladb68482012-01-17 16:31:51 -0800629
630 // But if the Service is reloaded, it is eligible for auto-connect
631 // again.
632 NiceMock<MockStore> storage;
633 EXPECT_CALL(storage, ContainsGroup(storage_id_)).WillOnce(Return(true));
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700634 EXPECT_CALL(*eap_, Load(&storage, storage_id_));
mukesh agrawaladb68482012-01-17 16:31:51 -0800635 EXPECT_TRUE(service_->Load(&storage));
mukesh agrawalbf14e942012-03-02 14:36:34 -0800636 EXPECT_TRUE(service_->IsAutoConnectable(&reason));
mukesh agrawaladb68482012-01-17 16:31:51 -0800637
638 // A deliberate Connect should also re-enable auto-connect.
Christopher Wileyabd3b502012-09-26 13:08:52 -0700639 service_->UserInitiatedDisconnect(&error);
mukesh agrawalbf14e942012-03-02 14:36:34 -0800640 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
mukesh agrawaldc7b8442012-09-27 13:48:14 -0700641 service_->Connect(&error, "in test");
mukesh agrawalbf14e942012-03-02 14:36:34 -0800642 EXPECT_TRUE(service_->IsAutoConnectable(&reason));
mukesh agrawaladb68482012-01-17 16:31:51 -0800643
Christopher Wileyabd3b502012-09-26 13:08:52 -0700644 // A non-user initiated Disconnect doesn't change anything.
645 service_->Disconnect(&error);
646 EXPECT_TRUE(service_->IsAutoConnectable(&reason));
647
Christopher Wileya4c61ae2012-10-01 11:04:30 -0700648 // A resume also re-enables auto-connect.
649 service_->UserInitiatedDisconnect(&error);
650 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
651 service_->OnAfterResume();
652 EXPECT_TRUE(service_->IsAutoConnectable(&reason));
mukesh agrawaladb68482012-01-17 16:31:51 -0800653
mukesh agrawal76d13882012-01-12 15:23:11 -0800654 service_->SetState(Service::kStateConnected);
mukesh agrawalbf14e942012-03-02 14:36:34 -0800655 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
656 EXPECT_STREQ(Service::kAutoConnConnected, reason);
mukesh agrawal76d13882012-01-12 15:23:11 -0800657
658 service_->SetState(Service::kStateAssociating);
mukesh agrawalbf14e942012-03-02 14:36:34 -0800659 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
660 EXPECT_STREQ(Service::kAutoConnConnecting, reason);
mukesh agrawal76d13882012-01-12 15:23:11 -0800661}
662
mukesh agrawal03c15ce2012-11-29 17:36:21 -0800663TEST_F(ServiceTest, AutoConnectLogging) {
664 ScopedMockLog log;
665 EXPECT_CALL(log, Log(_, _, _));
mukesh agrawalcbfb34e2013-04-17 19:33:25 -0700666 service_->SetConnectable(true);
mukesh agrawal03c15ce2012-11-29 17:36:21 -0800667
668 ScopeLogger::GetInstance()->EnableScopesByName("+service");
669 ScopeLogger::GetInstance()->set_verbose_level(1);
670 service_->SetState(Service::kStateConnected);
671 EXPECT_CALL(log, Log(-1, _, HasSubstr(Service::kAutoConnConnected)));
672 service_->AutoConnect();
673
674 ScopeLogger::GetInstance()->EnableScopesByName("-service");
675 ScopeLogger::GetInstance()->set_verbose_level(0);
676 EXPECT_CALL(log, Log(logging::LOG_INFO, _,
677 HasSubstr(Service::kAutoConnNotConnectable)));
mukesh agrawalcbfb34e2013-04-17 19:33:25 -0700678 service_->SetConnectable(false);
mukesh agrawal03c15ce2012-11-29 17:36:21 -0800679 service_->AutoConnect();
680}
681
682
Christopher Wiley0801d192012-09-24 11:57:15 -0700683TEST_F(AllMockServiceTest, AutoConnectWithFailures) {
684 const char *reason;
mukesh agrawalcbfb34e2013-04-17 19:33:25 -0700685 service_->SetConnectable(true);
Darin Petkov4cbff5b2013-01-29 16:29:05 +0100686 service_->technology_ = Technology::kEthernet;
Christopher Wiley0801d192012-09-24 11:57:15 -0700687 EXPECT_TRUE(service_->IsAutoConnectable(&reason));
688
689 // The very first AutoConnect() doesn't trigger any throttling.
690 EXPECT_CALL(dispatcher_, PostDelayedTask(_, _)).Times(0);
691 service_->AutoConnect();
692 Mock::VerifyAndClearExpectations(&dispatcher_);
693 EXPECT_TRUE(service_->IsAutoConnectable(&reason));
694
695 // The second call does trigger some throttling.
696 EXPECT_CALL(dispatcher_, PostDelayedTask(_,
697 Service::kMinAutoConnectCooldownTimeMilliseconds));
698 service_->AutoConnect();
699 Mock::VerifyAndClearExpectations(&dispatcher_);
700 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
701 EXPECT_STREQ(Service::kAutoConnThrottled, reason);
702
703 // Calling AutoConnect() again before the cooldown terminates does not change
704 // the timeout.
705 EXPECT_CALL(dispatcher_, PostDelayedTask(_, _)).Times(0);
706 service_->AutoConnect();
707 Mock::VerifyAndClearExpectations(&dispatcher_);
708 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
709 EXPECT_STREQ(Service::kAutoConnThrottled, reason);
710
711 // Once the timeout expires, we can AutoConnect() again.
712 service_->ReEnableAutoConnectTask();
713 EXPECT_TRUE(service_->IsAutoConnectable(&reason));
714
715 // Timeouts increase exponentially.
716 uint64 next_cooldown_time = service_->auto_connect_cooldown_milliseconds_;
717 EXPECT_EQ(next_cooldown_time,
718 Service::kAutoConnectCooldownBackoffFactor *
719 Service::kMinAutoConnectCooldownTimeMilliseconds);
720 while (next_cooldown_time <=
721 Service::kMaxAutoConnectCooldownTimeMilliseconds) {
722 EXPECT_CALL(dispatcher_, PostDelayedTask(_, next_cooldown_time));
723 service_->AutoConnect();
724 Mock::VerifyAndClearExpectations(&dispatcher_);
725 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
726 EXPECT_STREQ(Service::kAutoConnThrottled, reason);
727 service_->ReEnableAutoConnectTask();
728 next_cooldown_time *= Service::kAutoConnectCooldownBackoffFactor;
729 }
730
731 // Once we hit our cap, future timeouts are the same.
732 for (int32 i = 0; i < 2; i++) {
733 EXPECT_CALL(dispatcher_, PostDelayedTask(_,
734 Service::kMaxAutoConnectCooldownTimeMilliseconds));
735 service_->AutoConnect();
736 Mock::VerifyAndClearExpectations(&dispatcher_);
737 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
738 EXPECT_STREQ(Service::kAutoConnThrottled, reason);
739 service_->ReEnableAutoConnectTask();
740 }
741
742 // Connecting successfully resets our cooldown.
743 service_->SetState(Service::kStateConnected);
744 service_->SetState(Service::kStateIdle);
745 reason = "";
746 EXPECT_TRUE(service_->IsAutoConnectable(&reason));
747 EXPECT_STREQ("", reason);
748 EXPECT_EQ(service_->auto_connect_cooldown_milliseconds_, 0);
749
750 // But future AutoConnects behave as before
751 EXPECT_CALL(dispatcher_, PostDelayedTask(_,
752 Service::kMinAutoConnectCooldownTimeMilliseconds)).Times(1);
753 service_->AutoConnect();
754 service_->AutoConnect();
755 Mock::VerifyAndClearExpectations(&dispatcher_);
756 EXPECT_FALSE(service_->IsAutoConnectable(&reason));
757 EXPECT_STREQ(Service::kAutoConnThrottled, reason);
758
759 // Cooldowns are forgotten if we go through a suspend/resume cycle.
760 service_->OnAfterResume();
761 reason = "";
762 EXPECT_TRUE(service_->IsAutoConnectable(&reason));
763 EXPECT_STREQ("", reason);
764}
765
Paul Stewartcb59fed2012-03-21 21:14:46 -0700766TEST_F(ServiceTest, ConfigureBadProperty) {
767 KeyValueStore args;
768 args.SetString("XXXInvalid", "Value");
769 Error error;
770 service_->Configure(args, &error);
771 EXPECT_FALSE(error.IsSuccess());
772}
773
774TEST_F(ServiceTest, ConfigureBoolProperty) {
775 service_->MakeFavorite();
mukesh agrawalcbfb34e2013-04-17 19:33:25 -0700776 service_->SetAutoConnect(false);
Paul Stewartcb59fed2012-03-21 21:14:46 -0700777 ASSERT_FALSE(service_->auto_connect());
778 KeyValueStore args;
779 args.SetBool(flimflam::kAutoConnectProperty, true);
780 Error error;
781 service_->Configure(args, &error);
782 EXPECT_TRUE(error.IsSuccess());
783 EXPECT_TRUE(service_->auto_connect());
784}
785
786TEST_F(ServiceTest, ConfigureStringProperty) {
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700787 const string kGuid0 = "guid_zero";
788 const string kGuid1 = "guid_one";
mukesh agrawalcbfb34e2013-04-17 19:33:25 -0700789 service_->SetGuid(kGuid0, NULL);
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700790 ASSERT_EQ(kGuid0, service_->guid());
Paul Stewartcb59fed2012-03-21 21:14:46 -0700791 KeyValueStore args;
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700792 args.SetString(flimflam::kGuidProperty, kGuid1);
Paul Stewartcb59fed2012-03-21 21:14:46 -0700793 Error error;
794 service_->Configure(args, &error);
795 EXPECT_TRUE(error.IsSuccess());
Paul Stewartc43cbbe2013-04-11 06:29:30 -0700796 EXPECT_EQ(kGuid1, service_->guid());
797}
798
799TEST_F(ServiceTest, ConfigureEapStringProperty) {
800 MockEapCredentials *eap = new MockEapCredentials();
801 service2_->SetEapCredentials(eap); // Passes ownership.
802
803 const string kEAPManagement0 = "management_zero";
804 const string kEAPManagement1 = "management_one";
805 service2_->SetEAPKeyManagement(kEAPManagement0);
806
807 EXPECT_CALL(*eap, key_management())
808 .WillOnce(ReturnRef(kEAPManagement0));
809 ASSERT_EQ(kEAPManagement0, service2_->GetEAPKeyManagement());
810 KeyValueStore args;
811 EXPECT_CALL(*eap, SetKeyManagement(kEAPManagement1, _));
812 args.SetString(flimflam::kEapKeyMgmtProperty, kEAPManagement1);
813 Error error;
814 service2_->Configure(args, &error);
815 EXPECT_TRUE(error.IsSuccess());
Paul Stewartcb59fed2012-03-21 21:14:46 -0700816}
817
Paul Stewart7a20aa42013-01-17 12:21:41 -0800818TEST_F(ServiceTest, ConfigureIntProperty) {
819 const int kPriority0 = 100;
820 const int kPriority1 = 200;
mukesh agrawalcbfb34e2013-04-17 19:33:25 -0700821 service_->SetPriority(kPriority0, NULL);
Paul Stewart7a20aa42013-01-17 12:21:41 -0800822 ASSERT_EQ(kPriority0, service_->priority());
823 KeyValueStore args;
824 args.SetInt(flimflam::kPriorityProperty, kPriority1);
825 Error error;
826 service_->Configure(args, &error);
827 EXPECT_TRUE(error.IsSuccess());
828 EXPECT_EQ(kPriority1, service_->priority());
829}
830
Paul Stewartcb59fed2012-03-21 21:14:46 -0700831TEST_F(ServiceTest, ConfigureIgnoredProperty) {
832 service_->MakeFavorite();
mukesh agrawalcbfb34e2013-04-17 19:33:25 -0700833 service_->SetAutoConnect(false);
Paul Stewartcb59fed2012-03-21 21:14:46 -0700834 ASSERT_FALSE(service_->auto_connect());
835 KeyValueStore args;
836 args.SetBool(flimflam::kAutoConnectProperty, true);
837 Error error;
838 service_->IgnoreParameterForConfigure(flimflam::kAutoConnectProperty);
839 service_->Configure(args, &error);
840 EXPECT_TRUE(error.IsSuccess());
841 EXPECT_FALSE(service_->auto_connect());
842}
843
Paul Stewart7a20aa42013-01-17 12:21:41 -0800844TEST_F(ServiceTest, DoPropertiesMatch) {
mukesh agrawalcbfb34e2013-04-17 19:33:25 -0700845 service_->SetAutoConnect(false);
Paul Stewart7a20aa42013-01-17 12:21:41 -0800846 const string kGUID0 = "guid_zero";
847 const string kGUID1 = "guid_one";
mukesh agrawalcbfb34e2013-04-17 19:33:25 -0700848 service_->SetGuid(kGUID0, NULL);
Paul Stewart7a20aa42013-01-17 12:21:41 -0800849 const uint32 kPriority0 = 100;
850 const uint32 kPriority1 = 200;
mukesh agrawalcbfb34e2013-04-17 19:33:25 -0700851 service_->SetPriority(kPriority0, NULL);
Paul Stewart7a20aa42013-01-17 12:21:41 -0800852
853 {
854 KeyValueStore args;
855 args.SetString(flimflam::kGuidProperty, kGUID0);
856 args.SetBool(flimflam::kAutoConnectProperty, false);
857 args.SetInt(flimflam::kPriorityProperty, kPriority0);
858 EXPECT_TRUE(service_->DoPropertiesMatch(args));
859 }
860 {
861 KeyValueStore args;
862 args.SetString(flimflam::kGuidProperty, kGUID1);
863 args.SetBool(flimflam::kAutoConnectProperty, false);
864 args.SetInt(flimflam::kPriorityProperty, kPriority0);
865 EXPECT_FALSE(service_->DoPropertiesMatch(args));
866 }
867 {
868 KeyValueStore args;
869 args.SetString(flimflam::kGuidProperty, kGUID0);
870 args.SetBool(flimflam::kAutoConnectProperty, true);
871 args.SetInt(flimflam::kPriorityProperty, kPriority0);
872 EXPECT_FALSE(service_->DoPropertiesMatch(args));
873 }
874 {
875 KeyValueStore args;
876 args.SetString(flimflam::kGuidProperty, kGUID0);
877 args.SetBool(flimflam::kAutoConnectProperty, false);
878 args.SetInt(flimflam::kPriorityProperty, kPriority1);
879 EXPECT_FALSE(service_->DoPropertiesMatch(args));
880 }
881}
882
Paul Stewart10ccbb32012-04-26 15:59:30 -0700883TEST_F(ServiceTest, IsRemembered) {
884 ServiceConstRefPtr service_ref(service_);
885 service_->set_profile(NULL);
886 EXPECT_CALL(mock_manager_, IsServiceEphemeral(_)).Times(0);
887 EXPECT_FALSE(service_->IsRemembered());
888
889 scoped_refptr<MockProfile> profile(
Thieu Le5133b712013-02-19 14:47:21 -0800890 new StrictMock<MockProfile>(control_interface(), metrics(), manager()));
Paul Stewart10ccbb32012-04-26 15:59:30 -0700891 service_->set_profile(profile);
892 EXPECT_CALL(mock_manager_, IsServiceEphemeral(service_ref))
893 .WillOnce(Return(true))
894 .WillOnce(Return(false));
895 EXPECT_FALSE(service_->IsRemembered());
896 EXPECT_TRUE(service_->IsRemembered());
897}
898
Paul Stewartdf3c0a82012-11-09 15:54:33 -0800899TEST_F(ServiceTest, IsDependentOn) {
900 EXPECT_FALSE(service_->IsDependentOn(NULL));
901
902 scoped_ptr<MockDeviceInfo> mock_device_info(
903 new NiceMock<MockDeviceInfo>(control_interface(), dispatcher(), metrics(),
904 &mock_manager_));
905 scoped_refptr<MockConnection> mock_connection0(
906 new NiceMock<MockConnection>(mock_device_info.get()));
907 scoped_refptr<MockConnection> mock_connection1(
908 new NiceMock<MockConnection>(mock_device_info.get()));
909
910 service_->connection_ = mock_connection0;
Paul Stewartcd7f5852013-03-27 13:54:23 -0700911 EXPECT_CALL(*mock_connection0, GetLowerConnection())
Paul Stewartdf3c0a82012-11-09 15:54:33 -0800912 .WillRepeatedly(Return(mock_connection1));
Paul Stewartcd7f5852013-03-27 13:54:23 -0700913 EXPECT_CALL(*mock_connection1, GetLowerConnection())
914 .WillRepeatedly(Return(ConnectionRefPtr()));
Paul Stewartdf3c0a82012-11-09 15:54:33 -0800915 EXPECT_FALSE(service_->IsDependentOn(NULL));
916
917 scoped_refptr<ServiceUnderTest> service1 =
918 new ServiceUnderTest(control_interface(),
919 dispatcher(),
920 metrics(),
921 &mock_manager_);
922 EXPECT_FALSE(service_->IsDependentOn(service1));
923
924 service1->connection_ = mock_connection0;
925 EXPECT_FALSE(service_->IsDependentOn(service1));
926
927 service1->connection_ = mock_connection1;
928 EXPECT_TRUE(service_->IsDependentOn(service1));
929
Paul Stewartcd7f5852013-03-27 13:54:23 -0700930 service_->connection_ = mock_connection1;
Paul Stewartdf3c0a82012-11-09 15:54:33 -0800931 service1->connection_ = NULL;
Paul Stewartcd7f5852013-03-27 13:54:23 -0700932 EXPECT_FALSE(service_->IsDependentOn(service1));
933
934 service_->connection_ = NULL;
Paul Stewartdf3c0a82012-11-09 15:54:33 -0800935}
936
Paul Stewartff14b022012-04-24 20:06:23 -0700937TEST_F(ServiceTest, OnPropertyChanged) {
938 scoped_refptr<MockProfile> profile(
Thieu Le5133b712013-02-19 14:47:21 -0800939 new StrictMock<MockProfile>(control_interface(), metrics(), manager()));
Paul Stewartff14b022012-04-24 20:06:23 -0700940 service_->set_profile(NULL);
941 // Expect no crash.
942 service_->OnPropertyChanged("");
943
944 // Expect no call to Update if the profile has no storage.
945 service_->set_profile(profile);
946 EXPECT_CALL(*profile, UpdateService(_)).Times(0);
947 EXPECT_CALL(*profile, GetConstStorage())
948 .WillOnce(Return(reinterpret_cast<StoreInterface *>(NULL)));
949 service_->OnPropertyChanged("");
950
951 // Expect call to Update if the profile has storage.
952 EXPECT_CALL(*profile, UpdateService(_)).Times(1);
953 NiceMock<MockStore> storage;
954 EXPECT_CALL(*profile, GetConstStorage()).WillOnce(Return(&storage));
955 service_->OnPropertyChanged("");
956}
957
Paul Stewartd215af62012-04-24 23:25:50 -0700958
959TEST_F(ServiceTest, RecheckPortal) {
960 ServiceRefPtr service_ref(service_);
961 service_->state_ = Service::kStateIdle;
962 EXPECT_CALL(mock_manager_, RecheckPortalOnService(_)).Times(0);
963 service_->OnPropertyChanged(flimflam::kCheckPortalProperty);
964
965 service_->state_ = Service::kStatePortal;
966 EXPECT_CALL(mock_manager_, RecheckPortalOnService(service_ref)).Times(1);
967 service_->OnPropertyChanged(flimflam::kCheckPortalProperty);
968
969 service_->state_ = Service::kStateConnected;
970 EXPECT_CALL(mock_manager_, RecheckPortalOnService(service_ref)).Times(1);
971 service_->OnPropertyChanged(flimflam::kProxyConfigProperty);
972
973 service_->state_ = Service::kStateOnline;
974 EXPECT_CALL(mock_manager_, RecheckPortalOnService(service_ref)).Times(1);
975 service_->OnPropertyChanged(flimflam::kCheckPortalProperty);
976
977 service_->state_ = Service::kStatePortal;
978 EXPECT_CALL(mock_manager_, RecheckPortalOnService(_)).Times(0);
979 service_->OnPropertyChanged(flimflam::kEAPKeyIDProperty);
980}
981
982TEST_F(ServiceTest, SetCheckPortal) {
983 ServiceRefPtr service_ref(service_);
984 {
985 Error error;
986 service_->SetCheckPortal("false", &error);
987 EXPECT_TRUE(error.IsSuccess());
988 EXPECT_EQ(Service::kCheckPortalFalse, service_->check_portal_);
989 }
990 {
991 Error error;
992 service_->SetCheckPortal("true", &error);
993 EXPECT_TRUE(error.IsSuccess());
994 EXPECT_EQ(Service::kCheckPortalTrue, service_->check_portal_);
995 }
996 {
997 Error error;
998 service_->SetCheckPortal("auto", &error);
999 EXPECT_TRUE(error.IsSuccess());
1000 EXPECT_EQ(Service::kCheckPortalAuto, service_->check_portal_);
1001 }
1002 {
1003 Error error;
1004 service_->SetCheckPortal("xxx", &error);
1005 EXPECT_FALSE(error.IsSuccess());
1006 EXPECT_EQ(Error::kInvalidArguments, error.type());
1007 EXPECT_EQ(Service::kCheckPortalAuto, service_->check_portal_);
1008 }
1009}
1010
Arman Uguray2717a102013-01-29 23:36:06 -08001011TEST_F(ServiceTest, SetFriendlyName) {
1012 EXPECT_EQ(service_->unique_name_, service_->friendly_name_);
Darin Petkovaba89322013-03-11 14:48:22 +01001013 ServiceMockAdaptor *adaptor = GetAdaptor();
Arman Uguray2717a102013-01-29 23:36:06 -08001014
1015 EXPECT_CALL(*adaptor, EmitStringChanged(_, _)).Times(0);
1016 service_->SetFriendlyName(service_->unique_name_);
1017 EXPECT_EQ(service_->unique_name_, service_->friendly_name_);
1018
1019 EXPECT_CALL(*adaptor, EmitStringChanged(flimflam::kNameProperty,
1020 "Test Name 1"));
1021 service_->SetFriendlyName("Test Name 1");
1022 EXPECT_EQ("Test Name 1", service_->friendly_name_);
1023
1024 EXPECT_CALL(*adaptor, EmitStringChanged(_, _)).Times(0);
1025 service_->SetFriendlyName("Test Name 1");
1026 EXPECT_EQ("Test Name 1", service_->friendly_name_);
1027
1028 EXPECT_CALL(*adaptor, EmitStringChanged(flimflam::kNameProperty,
1029 "Test Name 2"));
1030 service_->SetFriendlyName("Test Name 2");
1031 EXPECT_EQ("Test Name 2", service_->friendly_name_);
1032}
1033
mukesh agrawalcbfb34e2013-04-17 19:33:25 -07001034TEST_F(ServiceTest, SetConnectableFull) {
Darin Petkovb2ba39f2012-06-06 10:33:43 +02001035 EXPECT_FALSE(service_->connectable());
1036
Darin Petkovaba89322013-03-11 14:48:22 +01001037 ServiceMockAdaptor *adaptor = GetAdaptor();
Darin Petkovb2ba39f2012-06-06 10:33:43 +02001038
1039 EXPECT_CALL(*adaptor, EmitBoolChanged(_, _)).Times(0);
1040 EXPECT_CALL(mock_manager_, HasService(_)).Times(0);
mukesh agrawalcbfb34e2013-04-17 19:33:25 -07001041 service_->SetConnectableFull(false);
Darin Petkovb2ba39f2012-06-06 10:33:43 +02001042 EXPECT_FALSE(service_->connectable());
1043
1044 EXPECT_CALL(*adaptor, EmitBoolChanged(flimflam::kConnectableProperty, true));
1045 EXPECT_CALL(mock_manager_, HasService(_)).WillOnce(Return(false));
1046 EXPECT_CALL(mock_manager_, UpdateService(_)).Times(0);
mukesh agrawalcbfb34e2013-04-17 19:33:25 -07001047 service_->SetConnectableFull(true);
Darin Petkovb2ba39f2012-06-06 10:33:43 +02001048 EXPECT_TRUE(service_->connectable());
1049
1050 EXPECT_CALL(*adaptor, EmitBoolChanged(flimflam::kConnectableProperty, false));
1051 EXPECT_CALL(mock_manager_, HasService(_)).WillOnce(Return(true));
1052 EXPECT_CALL(mock_manager_, UpdateService(_));
mukesh agrawalcbfb34e2013-04-17 19:33:25 -07001053 service_->SetConnectableFull(false);
Darin Petkovb2ba39f2012-06-06 10:33:43 +02001054 EXPECT_FALSE(service_->connectable());
1055
1056 EXPECT_CALL(*adaptor, EmitBoolChanged(flimflam::kConnectableProperty, true));
1057 EXPECT_CALL(mock_manager_, HasService(_)).WillOnce(Return(true));
1058 EXPECT_CALL(mock_manager_, UpdateService(_));
mukesh agrawalcbfb34e2013-04-17 19:33:25 -07001059 service_->SetConnectableFull(true);
Darin Petkovb2ba39f2012-06-06 10:33:43 +02001060 EXPECT_TRUE(service_->connectable());
1061}
1062
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001063class WriteOnlyServicePropertyTest : public ServiceTest {};
1064TEST_P(WriteOnlyServicePropertyTest, PropertyWriteOnly) {
1065 // Use a real EapCredentials instance since the base Service class
1066 // contains no write-only properties.
1067 EapCredentials eap;
1068 eap.InitPropertyStore(service_->mutable_store());
1069
Paul Stewart9f32d192012-01-30 20:37:50 -08001070 string property(GetParam().reader().get_string());
Paul Stewarte6e8e492013-01-17 11:00:50 -08001071 Error error;
1072 EXPECT_FALSE(service_->store().GetStringProperty(property, NULL, &error));
1073 EXPECT_EQ(Error::kPermissionDenied, error.type());
Paul Stewart9f32d192012-01-30 20:37:50 -08001074}
1075
1076INSTANTIATE_TEST_CASE_P(
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001077 WriteOnlyServicePropertyTestInstance,
1078 WriteOnlyServicePropertyTest,
Paul Stewart9f32d192012-01-30 20:37:50 -08001079 Values(
1080 DBusAdaptor::StringToVariant(flimflam::kEapPrivateKeyPasswordProperty),
1081 DBusAdaptor::StringToVariant(flimflam::kEapPasswordProperty)));
1082
Paul Stewart10241e32012-04-23 18:15:06 -07001083
1084TEST_F(ServiceTest, GetIPConfigRpcIdentifier) {
1085 {
1086 Error error;
1087 EXPECT_EQ("/", service_->GetIPConfigRpcIdentifier(&error));
1088 EXPECT_EQ(Error::kNotFound, error.type());
1089 }
1090
1091 scoped_ptr<MockDeviceInfo> mock_device_info(
1092 new NiceMock<MockDeviceInfo>(control_interface(), dispatcher(), metrics(),
1093 &mock_manager_));
1094 scoped_refptr<MockConnection> mock_connection(
1095 new NiceMock<MockConnection>(mock_device_info.get()));
1096
1097 service_->connection_ = mock_connection;
1098
1099 {
1100 Error error;
1101 const string empty_string;
1102 EXPECT_CALL(*mock_connection, ipconfig_rpc_identifier())
1103 .WillOnce(ReturnRef(empty_string));
1104 EXPECT_EQ("/", service_->GetIPConfigRpcIdentifier(&error));
1105 EXPECT_EQ(Error::kNotFound, error.type());
1106 }
1107
1108 {
1109 Error error;
1110 const string nonempty_string("/ipconfig/path");
1111 EXPECT_CALL(*mock_connection, ipconfig_rpc_identifier())
1112 .WillOnce(ReturnRef(nonempty_string));
1113 EXPECT_EQ(nonempty_string, service_->GetIPConfigRpcIdentifier(&error));
1114 EXPECT_EQ(Error::kSuccess, error.type());
1115 }
1116
1117 // Assure orderly destruction of the Connection before DeviceInfo.
1118 service_->connection_ = NULL;
1119 mock_connection = NULL;
1120 mock_device_info.reset();
1121}
1122
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001123class ServiceWithMockOnEapCredentialsChanged : public ServiceUnderTest {
Paul Stewart81426132012-05-16 10:05:10 -07001124 public:
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001125 ServiceWithMockOnEapCredentialsChanged(ControlInterface *control_interface,
1126 EventDispatcher *dispatcher,
1127 Metrics *metrics,
1128 Manager *manager)
Paul Stewart81426132012-05-16 10:05:10 -07001129 : ServiceUnderTest(control_interface, dispatcher, metrics, manager),
1130 is_8021x_(false) {}
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001131 MOCK_METHOD0(OnEapCredentialsChanged, void());
Paul Stewart81426132012-05-16 10:05:10 -07001132 virtual bool Is8021x() const { return is_8021x_; }
1133 void set_is_8021x(bool is_8021x) { is_8021x_ = is_8021x; }
1134
1135 private:
1136 bool is_8021x_;
1137};
1138
1139TEST_F(ServiceTest, SetEAPCredentialsOverRPC) {
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001140 scoped_refptr<ServiceWithMockOnEapCredentialsChanged> service(
1141 new ServiceWithMockOnEapCredentialsChanged(control_interface(),
1142 dispatcher(),
1143 metrics(),
1144 &mock_manager_));
Paul Stewart81426132012-05-16 10:05:10 -07001145 string eap_credential_properties[] = {
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001146 flimflam::kEapAnonymousIdentityProperty,
Paul Stewart81426132012-05-16 10:05:10 -07001147 flimflam::kEAPCertIDProperty,
1148 flimflam::kEAPClientCertProperty,
Paul Stewart81426132012-05-16 10:05:10 -07001149 flimflam::kEapIdentityProperty,
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001150 flimflam::kEAPKeyIDProperty,
Paul Stewart81426132012-05-16 10:05:10 -07001151 flimflam::kEapPasswordProperty,
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001152 flimflam::kEAPPINProperty,
1153 flimflam::kEapPrivateKeyProperty,
1154 flimflam::kEapPrivateKeyPasswordProperty
Paul Stewart81426132012-05-16 10:05:10 -07001155 };
1156 string eap_non_credential_properties[] = {
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001157 flimflam::kEapCaCertIDProperty,
1158 flimflam::kEapCaCertNssProperty,
Paul Stewart81426132012-05-16 10:05:10 -07001159 flimflam::kEAPEAPProperty,
1160 flimflam::kEapPhase2AuthProperty,
Paul Stewart81426132012-05-16 10:05:10 -07001161 flimflam::kEapUseSystemCAsProperty
1162 };
1163 // While this is not an 802.1x-based service, none of these property
1164 // changes should cause a call to set_eap().
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001165 EXPECT_CALL(*service, OnEapCredentialsChanged()).Times(0);
Paul Stewart81426132012-05-16 10:05:10 -07001166 for (size_t i = 0; i < arraysize(eap_credential_properties); ++i)
1167 service->OnPropertyChanged(eap_credential_properties[i]);
1168 for (size_t i = 0; i < arraysize(eap_non_credential_properties); ++i)
1169 service->OnPropertyChanged(eap_non_credential_properties[i]);
Paul Stewartadf79d82012-07-18 16:09:56 -07001170 service->OnPropertyChanged(flimflam::kEapKeyMgmtProperty);
Paul Stewart81426132012-05-16 10:05:10 -07001171
1172 service->set_is_8021x(true);
1173
1174 // When this is an 802.1x-based service, set_eap should be called for
1175 // all credential-carrying properties.
1176 for (size_t i = 0; i < arraysize(eap_credential_properties); ++i) {
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001177 EXPECT_CALL(*service, OnEapCredentialsChanged()).Times(1);
Paul Stewart81426132012-05-16 10:05:10 -07001178 service->OnPropertyChanged(eap_credential_properties[i]);
1179 Mock::VerifyAndClearExpectations(service.get());
1180 }
Paul Stewartadf79d82012-07-18 16:09:56 -07001181
1182 // The key management property is a special case. While not strictly
1183 // a credential, it can change which credentials are used. Therefore it
1184 // should also trigger a call to set_eap();
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001185 EXPECT_CALL(*service, OnEapCredentialsChanged()).Times(1);
Paul Stewartadf79d82012-07-18 16:09:56 -07001186 service->OnPropertyChanged(flimflam::kEapKeyMgmtProperty);
1187 Mock::VerifyAndClearExpectations(service.get());
1188
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001189 EXPECT_CALL(*service, OnEapCredentialsChanged()).Times(0);
Paul Stewart81426132012-05-16 10:05:10 -07001190 for (size_t i = 0; i < arraysize(eap_non_credential_properties); ++i)
1191 service->OnPropertyChanged(eap_non_credential_properties[i]);
1192}
1193
Paul Stewartbc6e7392012-05-24 07:07:48 -07001194TEST_F(ServiceTest, Certification) {
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001195 EXPECT_FALSE(service_->remote_certification_.size());
Paul Stewartbc6e7392012-05-24 07:07:48 -07001196
1197 ScopedMockLog log;
1198 EXPECT_CALL(log, Log(logging::LOG_WARNING, _,
1199 HasSubstr("exceeds our maximum"))).Times(2);
1200 string kSubject("foo");
1201 EXPECT_FALSE(service_->AddEAPCertification(
1202 kSubject, Service::kEAPMaxCertificationElements));
1203 EXPECT_FALSE(service_->AddEAPCertification(
1204 kSubject, Service::kEAPMaxCertificationElements + 1));
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001205 EXPECT_FALSE(service_->remote_certification_.size());
Paul Stewartbc6e7392012-05-24 07:07:48 -07001206 Mock::VerifyAndClearExpectations(&log);
1207
1208 EXPECT_CALL(log,
1209 Log(logging::LOG_INFO, _, HasSubstr("Received certification")))
1210 .Times(1);
1211 EXPECT_TRUE(service_->AddEAPCertification(
1212 kSubject, Service::kEAPMaxCertificationElements - 1));
1213 Mock::VerifyAndClearExpectations(&log);
1214 EXPECT_EQ(Service::kEAPMaxCertificationElements,
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001215 service_->remote_certification_.size());
Paul Stewartbc6e7392012-05-24 07:07:48 -07001216 for (size_t i = 0; i < Service::kEAPMaxCertificationElements - 1; ++i) {
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001217 EXPECT_TRUE(service_->remote_certification_[i].empty());
Paul Stewartbc6e7392012-05-24 07:07:48 -07001218 }
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001219 EXPECT_EQ(kSubject, service_->remote_certification_[
Paul Stewartbc6e7392012-05-24 07:07:48 -07001220 Service::kEAPMaxCertificationElements - 1]);
1221
1222 // Re-adding the same name in the same position should not generate a log.
1223 EXPECT_CALL(log, Log(_, _, _)).Times(0);
1224 EXPECT_TRUE(service_->AddEAPCertification(
1225 kSubject, Service::kEAPMaxCertificationElements - 1));
1226
1227 // Replacing the item should generate a log message.
1228 EXPECT_CALL(log,
1229 Log(logging::LOG_INFO, _, HasSubstr("Received certification")))
1230 .Times(1);
1231 EXPECT_TRUE(service_->AddEAPCertification(
1232 kSubject + "x", Service::kEAPMaxCertificationElements - 1));
Paul Stewartc43cbbe2013-04-11 06:29:30 -07001233
1234 service_->ClearEAPCertification();
1235 EXPECT_TRUE(service_->remote_certification_.empty());
Paul Stewartbc6e7392012-05-24 07:07:48 -07001236}
1237
Darin Petkovc8d91e52013-01-21 11:43:47 +01001238TEST_F(ServiceTest, NoteDisconnectEventIdle) {
Paul Stewart483e4722012-12-18 10:23:17 -08001239 Timestamp timestamp;
Darin Petkovc8d91e52013-01-21 11:43:47 +01001240 EXPECT_CALL(time_, GetNow()).Times(4).WillRepeatedly((Return(timestamp)));
Darin Petkov385b9bc2012-12-03 15:25:05 +01001241 SetStateField(Service::kStateOnline);
Darin Petkov0857f8e2012-12-21 10:49:17 +01001242 EXPECT_FALSE(service_->HasRecentConnectionIssues());
Darin Petkov385b9bc2012-12-03 15:25:05 +01001243 service_->SetState(Service::kStateIdle);
Darin Petkovc8d91e52013-01-21 11:43:47 +01001244 // The transition Online->Idle is not an event.
Darin Petkov0857f8e2012-12-21 10:49:17 +01001245 EXPECT_FALSE(service_->HasRecentConnectionIssues());
Darin Petkovc8d91e52013-01-21 11:43:47 +01001246 service_->SetState(Service::kStateFailure);
1247 // The transition Online->Idle->Failure is a connection drop.
1248 EXPECT_TRUE(service_->HasRecentConnectionIssues());
Darin Petkov0857f8e2012-12-21 10:49:17 +01001249}
1250
1251TEST_F(ServiceTest, NoteDisconnectEventOnSetStateFailure) {
1252 Timestamp timestamp;
1253 EXPECT_CALL(time_, GetNow()).Times(3).WillRepeatedly((Return(timestamp)));
1254 SetStateField(Service::kStateOnline);
1255 EXPECT_FALSE(service_->HasRecentConnectionIssues());
1256 service_->SetState(Service::kStateFailure);
1257 EXPECT_TRUE(service_->HasRecentConnectionIssues());
1258}
1259
1260TEST_F(ServiceTest, NoteDisconnectEventOnSetFailureSilent) {
1261 Timestamp timestamp;
1262 EXPECT_CALL(time_, GetNow()).Times(3).WillRepeatedly((Return(timestamp)));
1263 SetStateField(Service::kStateConfiguring);
1264 EXPECT_FALSE(service_->HasRecentConnectionIssues());
1265 service_->SetFailureSilent(Service::kFailureEAPAuthentication);
Paul Stewart483e4722012-12-18 10:23:17 -08001266 EXPECT_TRUE(service_->HasRecentConnectionIssues());
Darin Petkov385b9bc2012-12-03 15:25:05 +01001267}
1268
1269TEST_F(ServiceTest, NoteDisconnectEventNonEvent) {
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001270 EXPECT_CALL(time_, GetNow()).Times(0);
Darin Petkov385b9bc2012-12-03 15:25:05 +01001271 EXPECT_CALL(diagnostics_reporter_, OnConnectivityEvent()).Times(0);
1272
1273 // Explicit disconnect is a non-event.
1274 SetStateField(Service::kStateOnline);
1275 SetExplicitlyDisconnected(true);
1276 NoteDisconnectEvent();
1277 EXPECT_TRUE(GetDisconnects()->empty());
1278 EXPECT_TRUE(GetMisconnects()->empty());
1279
1280 // Failure to idle transition is a non-event.
1281 SetStateField(Service::kStateFailure);
1282 SetExplicitlyDisconnected(false);
1283 NoteDisconnectEvent();
1284 EXPECT_TRUE(GetDisconnects()->empty());
1285 EXPECT_TRUE(GetMisconnects()->empty());
Darin Petkovcb0b5662012-12-13 09:59:44 +01001286
1287 // Disconnect while manager is stopped is a non-event.
1288 SetStateField(Service::kStateOnline);
1289 SetManagerRunning(false);
1290 NoteDisconnectEvent();
1291 EXPECT_TRUE(GetDisconnects()->empty());
1292 EXPECT_TRUE(GetMisconnects()->empty());
1293
1294 // Disconnect while suspending is a non-event.
1295 SetManagerRunning(true);
1296 SetPowerState(PowerManager::kSuspending);
1297 NoteDisconnectEvent();
1298 EXPECT_TRUE(GetDisconnects()->empty());
1299 EXPECT_TRUE(GetMisconnects()->empty());
Darin Petkov385b9bc2012-12-03 15:25:05 +01001300}
1301
1302TEST_F(ServiceTest, NoteDisconnectEventDisconnectOnce) {
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001303 const int kNow = 5;
Darin Petkov385b9bc2012-12-03 15:25:05 +01001304 EXPECT_FALSE(service_->explicitly_disconnected());
1305 SetStateField(Service::kStateOnline);
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001306 EXPECT_CALL(time_, GetNow()).WillOnce(Return(GetTimestamp(kNow, "")));
Darin Petkov385b9bc2012-12-03 15:25:05 +01001307 EXPECT_CALL(diagnostics_reporter_, OnConnectivityEvent()).Times(0);
1308 NoteDisconnectEvent();
1309 ASSERT_EQ(1, GetDisconnects()->size());
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001310 EXPECT_EQ(kNow, GetDisconnects()->front().monotonic.tv_sec);
Darin Petkov385b9bc2012-12-03 15:25:05 +01001311 EXPECT_TRUE(GetMisconnects()->empty());
Paul Stewart483e4722012-12-18 10:23:17 -08001312
1313 Mock::VerifyAndClearExpectations(&time_);
1314 EXPECT_CALL(time_, GetNow()).WillOnce(Return(GetTimestamp(
1315 kNow + GetDisconnectsMonitorSeconds() - 1, "")));
1316 EXPECT_TRUE(service_->HasRecentConnectionIssues());
1317 ASSERT_EQ(1, GetDisconnects()->size());
1318
1319 Mock::VerifyAndClearExpectations(&time_);
1320 EXPECT_CALL(time_, GetNow()).WillOnce(Return(GetTimestamp(
1321 kNow + GetDisconnectsMonitorSeconds(), "")));
1322 EXPECT_FALSE(service_->HasRecentConnectionIssues());
1323 ASSERT_TRUE(GetDisconnects()->empty());
Darin Petkov385b9bc2012-12-03 15:25:05 +01001324}
1325
1326TEST_F(ServiceTest, NoteDisconnectEventDisconnectThreshold) {
1327 EXPECT_FALSE(service_->explicitly_disconnected());
1328 SetStateField(Service::kStateOnline);
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001329 const int kNow = 6;
Darin Petkov385b9bc2012-12-03 15:25:05 +01001330 for (int i = 0; i < GetReportDisconnectsThreshold() - 1; i++) {
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001331 PushTimestamp(GetDisconnects(), kNow, "");
Darin Petkov385b9bc2012-12-03 15:25:05 +01001332 }
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001333 EXPECT_CALL(time_, GetNow()).WillOnce(Return(GetTimestamp(kNow, "")));
Darin Petkov385b9bc2012-12-03 15:25:05 +01001334 EXPECT_CALL(diagnostics_reporter_, OnConnectivityEvent()).Times(1);
1335 NoteDisconnectEvent();
1336 EXPECT_EQ(GetReportDisconnectsThreshold(), GetDisconnects()->size());
1337}
1338
1339TEST_F(ServiceTest, NoteDisconnectEventMisconnectOnce) {
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001340 const int kNow = 7;
Darin Petkov385b9bc2012-12-03 15:25:05 +01001341 EXPECT_FALSE(service_->explicitly_disconnected());
1342 SetStateField(Service::kStateConfiguring);
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001343 EXPECT_CALL(time_, GetNow()).WillOnce(Return(GetTimestamp(kNow, "")));
Darin Petkov385b9bc2012-12-03 15:25:05 +01001344 EXPECT_CALL(diagnostics_reporter_, OnConnectivityEvent()).Times(0);
1345 NoteDisconnectEvent();
1346 EXPECT_TRUE(GetDisconnects()->empty());
1347 ASSERT_EQ(1, GetMisconnects()->size());
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001348 EXPECT_EQ(kNow, GetMisconnects()->front().monotonic.tv_sec);
Paul Stewart483e4722012-12-18 10:23:17 -08001349
1350 Mock::VerifyAndClearExpectations(&time_);
1351 EXPECT_CALL(time_, GetNow()).WillOnce(Return(GetTimestamp(
1352 kNow + GetMisconnectsMonitorSeconds() - 1, "")));
1353 EXPECT_TRUE(service_->HasRecentConnectionIssues());
1354 ASSERT_EQ(1, GetMisconnects()->size());
1355
1356 Mock::VerifyAndClearExpectations(&time_);
1357 EXPECT_CALL(time_, GetNow()).WillOnce(Return(GetTimestamp(
1358 kNow + GetMisconnectsMonitorSeconds(), "")));
1359 EXPECT_FALSE(service_->HasRecentConnectionIssues());
1360 ASSERT_TRUE(GetMisconnects()->empty());
Darin Petkov385b9bc2012-12-03 15:25:05 +01001361}
1362
1363TEST_F(ServiceTest, NoteDisconnectEventMisconnectThreshold) {
1364 EXPECT_FALSE(service_->explicitly_disconnected());
1365 SetStateField(Service::kStateConfiguring);
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001366 const int kNow = 8;
Darin Petkov385b9bc2012-12-03 15:25:05 +01001367 for (int i = 0; i < GetReportMisconnectsThreshold() - 1; i++) {
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001368 PushTimestamp(GetMisconnects(), kNow, "");
Darin Petkov385b9bc2012-12-03 15:25:05 +01001369 }
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001370 EXPECT_CALL(time_, GetNow()).WillOnce(Return(GetTimestamp(kNow, "")));
Darin Petkov385b9bc2012-12-03 15:25:05 +01001371 EXPECT_CALL(diagnostics_reporter_, OnConnectivityEvent()).Times(1);
1372 NoteDisconnectEvent();
1373 EXPECT_EQ(GetReportMisconnectsThreshold(), GetMisconnects()->size());
1374}
1375
1376TEST_F(ServiceTest, NoteDisconnectEventDiscardOld) {
1377 EXPECT_FALSE(service_->explicitly_disconnected());
1378 EXPECT_CALL(diagnostics_reporter_, OnConnectivityEvent()).Times(0);
1379 for (int i = 0; i < 2; i++) {
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001380 int now = 0;
1381 deque<Timestamp> *events = NULL;
Darin Petkov385b9bc2012-12-03 15:25:05 +01001382 if (i == 0) {
1383 SetStateField(Service::kStateConnected);
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001384 now = GetDisconnectsMonitorSeconds() + 1;
Darin Petkov385b9bc2012-12-03 15:25:05 +01001385 events = GetDisconnects();
1386 } else {
1387 SetStateField(Service::kStateAssociating);
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001388 now = GetMisconnectsMonitorSeconds() + 1;
Darin Petkov385b9bc2012-12-03 15:25:05 +01001389 events = GetMisconnects();
1390 }
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001391 PushTimestamp(events, 0, "");
1392 PushTimestamp(events, 0, "");
1393 EXPECT_CALL(time_, GetNow()).WillOnce(Return(GetTimestamp(now, "")));
Darin Petkov385b9bc2012-12-03 15:25:05 +01001394 NoteDisconnectEvent();
1395 ASSERT_EQ(1, events->size());
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001396 EXPECT_EQ(now, events->front().monotonic.tv_sec);
Darin Petkov385b9bc2012-12-03 15:25:05 +01001397 }
1398}
1399
1400TEST_F(ServiceTest, NoteDisconnectEventDiscardExcessive) {
1401 EXPECT_FALSE(service_->explicitly_disconnected());
1402 SetStateField(Service::kStateOnline);
Darin Petkov385b9bc2012-12-03 15:25:05 +01001403 for (int i = 0; i < 2 * GetMaxDisconnectEventHistory(); i++) {
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001404 PushTimestamp(GetDisconnects(), 0, "");
Darin Petkov385b9bc2012-12-03 15:25:05 +01001405 }
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001406 EXPECT_CALL(time_, GetNow()).WillOnce(Return(Timestamp()));
Darin Petkov385b9bc2012-12-03 15:25:05 +01001407 EXPECT_CALL(diagnostics_reporter_, OnConnectivityEvent()).Times(1);
1408 NoteDisconnectEvent();
1409 EXPECT_EQ(GetMaxDisconnectEventHistory(), GetDisconnects()->size());
1410}
1411
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001412TEST_F(ServiceTest, ConvertTimestampsToStrings) {
1413 EXPECT_TRUE(ExtractWallClockToStrings(deque<Timestamp>()).empty());
1414
1415 const Timestamp kValues[] = {
Darin Petkov0857f8e2012-12-21 10:49:17 +01001416 GetTimestamp(123, "2012-12-09T12:41:22.123456+0100"),
1417 GetTimestamp(234, "2012-12-31T23:59:59.012345+0100")
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001418 };
1419 Strings strings =
1420 ExtractWallClockToStrings(
1421 deque<Timestamp>(kValues, kValues + arraysize(kValues)));
1422 EXPECT_GT(arraysize(kValues), 0);
1423 ASSERT_EQ(arraysize(kValues), strings.size());
1424 for (size_t i = 0; i < arraysize(kValues); i++) {
1425 EXPECT_EQ(kValues[i].wall_clock, strings[i]);
1426 }
1427}
1428
1429TEST_F(ServiceTest, DiagnosticsProperties) {
Darin Petkov0857f8e2012-12-21 10:49:17 +01001430 const string kWallClock0 = "2012-12-09T12:41:22.234567-0800";
1431 const string kWallClock1 = "2012-12-31T23:59:59.345678-0800";
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001432 Strings values;
1433
1434 PushTimestamp(GetDisconnects(), 0, kWallClock0);
Paul Stewarte6e8e492013-01-17 11:00:50 -08001435 Error unused_error;
1436 ASSERT_TRUE(service_->store().GetStringsProperty(
1437 kDiagnosticsDisconnectsProperty, &values, &unused_error));
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001438 ASSERT_EQ(1, values.size());
1439 EXPECT_EQ(kWallClock0, values[0]);
1440
1441 PushTimestamp(GetMisconnects(), 0, kWallClock1);
Paul Stewarte6e8e492013-01-17 11:00:50 -08001442 ASSERT_TRUE(service_->store().GetStringsProperty(
1443 kDiagnosticsMisconnectsProperty, &values, &unused_error));
Darin Petkov0c65bdd2012-12-05 13:42:41 +01001444 ASSERT_EQ(1, values.size());
1445 EXPECT_EQ(kWallClock1, values[0]);
1446}
1447
mukesh agrawal43970a22013-02-15 16:00:07 -08001448TEST_F(ServiceTest, SecurityLevel) {
1449 // Encrypted is better than not.
1450 service_->SetSecurity(Service::kCryptoNone, false, false);
1451 service2_->SetSecurity(Service::kCryptoRc4, false, false);
1452 EXPECT_GT(service2_->SecurityLevel(), service_->SecurityLevel());
1453
1454 // AES encryption is better than RC4 encryption.
1455 service_->SetSecurity(Service::kCryptoRc4, false, false);
1456 service2_->SetSecurity(Service::kCryptoAes, false, false);
1457 EXPECT_GT(service2_->SecurityLevel(), service_->SecurityLevel());
1458
1459 // Crypto algorithm is more important than key rotation.
1460 service_->SetSecurity(Service::kCryptoNone, true, false);
1461 service2_->SetSecurity(Service::kCryptoAes, false, false);
1462 EXPECT_GT(service2_->SecurityLevel(), service_->SecurityLevel());
1463
1464 // Encrypted-but-unauthenticated is better than clear-but-authenticated.
1465 service_->SetSecurity(Service::kCryptoNone, false, true);
1466 service2_->SetSecurity(Service::kCryptoAes, false, false);
1467 EXPECT_GT(service2_->SecurityLevel(), service_->SecurityLevel());
1468
1469 // For same encryption, prefer key rotation.
1470 service_->SetSecurity(Service::kCryptoRc4, false, false);
1471 service2_->SetSecurity(Service::kCryptoRc4, true, false);
1472 EXPECT_GT(service2_->SecurityLevel(), service_->SecurityLevel());
1473
1474 // For same encryption, prefer authenticated AP.
1475 service_->SetSecurity(Service::kCryptoRc4, false, false);
1476 service2_->SetSecurity(Service::kCryptoRc4, false, true);
1477 EXPECT_GT(service2_->SecurityLevel(), service_->SecurityLevel());
1478}
1479
Darin Petkovaba89322013-03-11 14:48:22 +01001480TEST_F(ServiceTest, SetErrorDetails) {
1481 EXPECT_EQ(Service::kErrorDetailsNone, service_->error_details());
1482 static const char kDetails[] = "Certificate revoked.";
1483 ServiceMockAdaptor *adaptor = GetAdaptor();
1484 EXPECT_CALL(*adaptor, EmitStringChanged(shill::kErrorDetailsProperty,
1485 kDetails));
1486 service_->SetErrorDetails(Service::kErrorDetailsNone);
1487 EXPECT_EQ(Service::kErrorDetailsNone, service_->error_details());
1488 service_->SetErrorDetails(kDetails);
1489 EXPECT_EQ(kDetails, service_->error_details());
1490 service_->SetErrorDetails(kDetails);
1491}
1492
mukesh agrawalcbfb34e2013-04-17 19:33:25 -07001493TEST_F(ServiceTest, SetAutoConnectFull) {
Darin Petkov36d962d2013-03-25 13:03:14 +01001494 EXPECT_FALSE(service_->auto_connect());
1495 Error error;
1496 EXPECT_FALSE(GetAutoConnect(&error));
1497 EXPECT_TRUE(error.IsSuccess());
1498
1499 // false -> false
1500 EXPECT_CALL(mock_manager_, UpdateService(_)).Times(0);
mukesh agrawalcbfb34e2013-04-17 19:33:25 -07001501 SetAutoConnectFull(false, &error);
Darin Petkov36d962d2013-03-25 13:03:14 +01001502 EXPECT_TRUE(error.IsSuccess());
1503 EXPECT_FALSE(service_->auto_connect());
1504 EXPECT_FALSE(GetAutoConnect(NULL));
1505 Mock::VerifyAndClearExpectations(&mock_manager_);
1506
1507 // false -> true
1508 EXPECT_CALL(mock_manager_, UpdateService(_)).Times(1);
mukesh agrawalcbfb34e2013-04-17 19:33:25 -07001509 SetAutoConnectFull(true, &error);
Darin Petkov36d962d2013-03-25 13:03:14 +01001510 EXPECT_TRUE(error.IsSuccess());
1511 EXPECT_TRUE(service_->auto_connect());
1512 EXPECT_TRUE(GetAutoConnect(NULL));
1513 Mock::VerifyAndClearExpectations(&mock_manager_);
1514
1515 // true -> true
1516 EXPECT_CALL(mock_manager_, UpdateService(_)).Times(0);
mukesh agrawalcbfb34e2013-04-17 19:33:25 -07001517 SetAutoConnectFull(true, &error);
Darin Petkov36d962d2013-03-25 13:03:14 +01001518 EXPECT_TRUE(error.IsSuccess());
1519 EXPECT_TRUE(service_->auto_connect());
1520 EXPECT_TRUE(GetAutoConnect(NULL));
1521 Mock::VerifyAndClearExpectations(&mock_manager_);
1522
1523 // true -> false
1524 EXPECT_CALL(mock_manager_, UpdateService(_)).Times(1);
mukesh agrawalcbfb34e2013-04-17 19:33:25 -07001525 SetAutoConnectFull(false, &error);
Darin Petkov36d962d2013-03-25 13:03:14 +01001526 EXPECT_TRUE(error.IsSuccess());
1527 EXPECT_FALSE(service_->auto_connect());
1528 EXPECT_FALSE(GetAutoConnect(NULL));
1529 Mock::VerifyAndClearExpectations(&mock_manager_);
1530}
1531
mukesh agrawalcbfb34e2013-04-17 19:33:25 -07001532TEST_F(ServiceTest, PropertyChanges) {
1533 TestCommonPropertyChanges(service_, GetAdaptor());
1534 TestAutoConnectPropertyChange(service_, GetAdaptor());
1535}
1536
mukesh agrawalbebf1b82013-04-23 15:06:33 -07001537// Custom property setters should return false, and make no changes, if
1538// the new value is the same as the old value.
1539TEST_F(ServiceTest, CustomSetterNoopChange) {
1540 TestCustomSetterNoopChange(service_, &mock_manager_);
1541}
1542
Chris Masone3bd3c8c2011-06-13 08:20:26 -07001543} // namespace shill