diff options
author | TreeHugger Robot <treehugger-gerrit@google.com> | 2020-05-05 01:58:58 +0000 |
---|---|---|
committer | Android (Google) Code Review <android-gerrit@google.com> | 2020-05-05 01:58:58 +0000 |
commit | f43baee357f1fcae89350be2c11cb641e2ff7999 (patch) | |
tree | 22969028549bbbb104d1cf8f9640aee61ed113bd /tests | |
parent | 412814b217444fb8799956d5e629565aaaae24ad (diff) | |
parent | 02ecfe461612465709a2d5f9a06a25f276252b35 (diff) |
Merge "WifiShellCommand: Add unit tests" into rvc-dev
Diffstat (limited to 'tests')
-rw-r--r-- | tests/wifitests/src/com/android/server/wifi/WifiShellCommandTest.java | 399 |
1 files changed, 399 insertions, 0 deletions
diff --git a/tests/wifitests/src/com/android/server/wifi/WifiShellCommandTest.java b/tests/wifitests/src/com/android/server/wifi/WifiShellCommandTest.java new file mode 100644 index 000000000..a1897ded9 --- /dev/null +++ b/tests/wifitests/src/com/android/server/wifi/WifiShellCommandTest.java @@ -0,0 +1,399 @@ +/* + * Copyright (C) 2020 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.android.server.wifi; + +import static org.junit.Assert.assertFalse; +import static org.mockito.ArgumentMatchers.anyBoolean; +import static org.mockito.ArgumentMatchers.anyInt; +import static org.mockito.ArgumentMatchers.anyString; +import static org.mockito.Mockito.never; +import static org.mockito.Mockito.times; +import static org.mockito.Mockito.validateMockitoUsage; +import static org.mockito.Mockito.verify; +import static org.mockito.Mockito.verifyNoMoreInteractions; +import static org.mockito.Mockito.when; + +import android.content.Context; +import android.net.ConnectivityManager; +import android.os.Binder; +import android.os.Process; + +import androidx.test.filters.SmallTest; + +import org.junit.After; +import org.junit.Before; +import org.junit.Test; +import org.mockito.Mock; +import org.mockito.MockitoAnnotations; + +import java.io.FileDescriptor; + +/** + * Unit tests for {@link com.android.server.wifi.WifiShellCommand}. + */ +@SmallTest +public class WifiShellCommandTest extends WifiBaseTest { + private static final String TEST_PACKAGE = "com.android.test"; + + @Mock WifiInjector mWifiInjector; + @Mock ClientModeImpl mClientModeImpl; + @Mock WifiLockManager mWifiLockManager; + @Mock WifiNetworkSuggestionsManager mWifiNetworkSuggestionsManager; + @Mock WifiConfigManager mWifiConfigManager; + @Mock WifiNative mWifiNative; + @Mock HostapdHal mHostapdHal; + @Mock WifiCountryCode mWifiCountryCode; + @Mock WifiLastResortWatchdog mWifiLastResortWatchdog; + @Mock WifiServiceImpl mWifiService; + @Mock Context mContext; + @Mock ConnectivityManager mConnectivityManager; + @Mock WifiCarrierInfoManager mWifiCarrierInfoManager; + + WifiShellCommand mWifiShellCommand; + + @Before + public void setUp() throws Exception { + MockitoAnnotations.initMocks(this); + + when(mWifiInjector.getClientModeImpl()).thenReturn(mClientModeImpl); + when(mWifiInjector.getWifiLockManager()).thenReturn(mWifiLockManager); + when(mWifiInjector.getWifiNetworkSuggestionsManager()) + .thenReturn(mWifiNetworkSuggestionsManager); + when(mWifiInjector.getWifiConfigManager()).thenReturn(mWifiConfigManager); + when(mWifiInjector.getHostapdHal()).thenReturn(mHostapdHal); + when(mWifiInjector.getWifiNative()).thenReturn(mWifiNative); + when(mWifiInjector.getWifiCountryCode()).thenReturn(mWifiCountryCode); + when(mWifiInjector.getWifiLastResortWatchdog()).thenReturn(mWifiLastResortWatchdog); + when(mWifiInjector.getWifiCarrierInfoManager()).thenReturn(mWifiCarrierInfoManager); + + mWifiShellCommand = new WifiShellCommand(mWifiInjector, mWifiService, mContext); + + // by default emulate shell uid. + BinderUtil.setUid(Process.SHELL_UID); + } + + @After + public void tearDown() throws Exception { + validateMockitoUsage(); + } + + @Test + public void testSetIpReachDisconnect() { + // not allowed for unrooted shell. + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"set-ipreach-disconnect", "enabled"}); + verify(mClientModeImpl, never()).setIpReachabilityDisconnectEnabled(anyBoolean()); + assertFalse(mWifiShellCommand.getErrPrintWriter().toString().isEmpty()); + + BinderUtil.setUid(Process.ROOT_UID); + + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"set-ipreach-disconnect", "enabled"}); + verify(mClientModeImpl).setIpReachabilityDisconnectEnabled(true); + + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"set-ipreach-disconnect", "disabled"}); + verify(mClientModeImpl).setIpReachabilityDisconnectEnabled(false); + + // invalid arg + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"set-ipreach-disconnect", "yes"}); + verifyNoMoreInteractions(mClientModeImpl); + assertFalse(mWifiShellCommand.getErrPrintWriter().toString().isEmpty()); + } + + @Test + public void testGetIpReachDisconnect() { + // not allowed for unrooted shell. + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"get-ipreach-disconnect"}); + verify(mClientModeImpl, never()).getIpReachabilityDisconnectEnabled(); + assertFalse(mWifiShellCommand.getErrPrintWriter().toString().isEmpty()); + + BinderUtil.setUid(Process.ROOT_UID); + + when(mClientModeImpl.getIpReachabilityDisconnectEnabled()).thenReturn(true); + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"get-ipreach-disconnect"}); + verify(mClientModeImpl).getIpReachabilityDisconnectEnabled(); + mWifiShellCommand.getOutPrintWriter().toString().contains( + "IPREACH_DISCONNECT state is true"); + + when(mClientModeImpl.getIpReachabilityDisconnectEnabled()).thenReturn(false); + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"get-ipreach-disconnect"}); + verify(mClientModeImpl, times(2)).getIpReachabilityDisconnectEnabled(); + mWifiShellCommand.getOutPrintWriter().toString().contains( + "IPREACH_DISCONNECT state is false"); + } + + @Test + public void testSetPollRssiIntervalMsecs() { + // not allowed for unrooted shell. + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"set-poll-rssi-interval-msecs", "5"}); + verify(mClientModeImpl, never()).setPollRssiIntervalMsecs(anyInt()); + assertFalse(mWifiShellCommand.getErrPrintWriter().toString().isEmpty()); + + BinderUtil.setUid(Process.ROOT_UID); + + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"set-poll-rssi-interval-msecs", "5"}); + verify(mClientModeImpl).setPollRssiIntervalMsecs(5); + + // invalid arg + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"set-poll-rssi-interval-msecs", "0"}); + verifyNoMoreInteractions(mClientModeImpl); + assertFalse(mWifiShellCommand.getErrPrintWriter().toString().isEmpty()); + } + + @Test + public void testGetPollRssiIntervalMsecs() { + // not allowed for unrooted shell. + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"get-poll-rssi-interval-msecs"}); + verify(mClientModeImpl, never()).getPollRssiIntervalMsecs(); + assertFalse(mWifiShellCommand.getErrPrintWriter().toString().isEmpty()); + + BinderUtil.setUid(Process.ROOT_UID); + + when(mClientModeImpl.getPollRssiIntervalMsecs()).thenReturn(5); + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"get-poll-rssi-interval-msecs"}); + verify(mClientModeImpl).getPollRssiIntervalMsecs(); + mWifiShellCommand.getOutPrintWriter().toString().contains( + "ClientModeImpl.mPollRssiIntervalMsecs = 5"); + } + + @Test + public void testForceHiPerfMode() { + // not allowed for unrooted shell. + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"force-hi-perf-mode", "enabled"}); + verify(mWifiLockManager, never()).forceHiPerfMode(anyBoolean()); + assertFalse(mWifiShellCommand.getErrPrintWriter().toString().isEmpty()); + + BinderUtil.setUid(Process.ROOT_UID); + + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"force-hi-perf-mode", "enabled"}); + verify(mWifiLockManager).forceHiPerfMode(true); + + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"force-hi-perf-mode", "disabled"}); + verify(mWifiLockManager).forceHiPerfMode(false); + } + + @Test + public void testForceLowLatencyMode() { + // not allowed for unrooted shell. + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"force-low-latency-mode", "enabled"}); + verify(mWifiLockManager, never()).forceLowLatencyMode(anyBoolean()); + assertFalse(mWifiShellCommand.getErrPrintWriter().toString().isEmpty()); + + BinderUtil.setUid(Process.ROOT_UID); + + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"force-low-latency-mode", "enabled"}); + verify(mWifiLockManager).forceLowLatencyMode(true); + + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"force-low-latency-mode", "disabled"}); + verify(mWifiLockManager).forceLowLatencyMode(false); + } + + @Test + public void testNetworkSuggestionsSetUserApproved() { + // not allowed for unrooted shell. + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"network-suggestions-set-user-approved", TEST_PACKAGE, "yes"}); + verify(mWifiNetworkSuggestionsManager, never()).setHasUserApprovedForApp( + anyBoolean(), anyString()); + assertFalse(mWifiShellCommand.getErrPrintWriter().toString().isEmpty()); + + BinderUtil.setUid(Process.ROOT_UID); + + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"network-suggestions-set-user-approved", TEST_PACKAGE, "yes"}); + verify(mWifiNetworkSuggestionsManager).setHasUserApprovedForApp( + true, TEST_PACKAGE); + + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"network-suggestions-set-user-approved", TEST_PACKAGE, "no"}); + verify(mWifiNetworkSuggestionsManager).setHasUserApprovedForApp( + false, TEST_PACKAGE); + } + + @Test + public void testNetworkSuggestionsHasUserApproved() { + // not allowed for unrooted shell. + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"network-suggestions-has-user-approved", TEST_PACKAGE}); + verify(mWifiNetworkSuggestionsManager, never()).hasUserApprovedForApp(anyString()); + assertFalse(mWifiShellCommand.getErrPrintWriter().toString().isEmpty()); + + BinderUtil.setUid(Process.ROOT_UID); + + when(mWifiNetworkSuggestionsManager.hasUserApprovedForApp(TEST_PACKAGE)) + .thenReturn(true); + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"network-suggestions-has-user-approved", TEST_PACKAGE}); + verify(mWifiNetworkSuggestionsManager).hasUserApprovedForApp(TEST_PACKAGE); + mWifiShellCommand.getOutPrintWriter().toString().contains("yes"); + + when(mWifiNetworkSuggestionsManager.hasUserApprovedForApp(TEST_PACKAGE)) + .thenReturn(false); + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"network-suggestions-has-user-approved", TEST_PACKAGE}); + verify(mWifiNetworkSuggestionsManager, times(2)).hasUserApprovedForApp(TEST_PACKAGE); + mWifiShellCommand.getOutPrintWriter().toString().contains("no"); + } + + @Test + public void testImsiProtectionExemptionsSetUserApproved() { + // not allowed for unrooted shell. + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"imsi-protection-exemption-set-user-approved-for-carrier", "5", + "yes"}); + verify(mWifiCarrierInfoManager, never()).setHasUserApprovedImsiPrivacyExemptionForCarrier( + anyBoolean(), anyInt()); + assertFalse(mWifiShellCommand.getErrPrintWriter().toString().isEmpty()); + + BinderUtil.setUid(Process.ROOT_UID); + + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"imsi-protection-exemption-set-user-approved-for-carrier", "5", + "yes"}); + verify(mWifiCarrierInfoManager).setHasUserApprovedImsiPrivacyExemptionForCarrier( + true, 5); + + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"imsi-protection-exemption-set-user-approved-for-carrier", "5", + "no"}); + verify(mWifiCarrierInfoManager).setHasUserApprovedImsiPrivacyExemptionForCarrier( + false, 5); + } + + @Test + public void testImsiProtectionExemptionsHasUserApproved() { + // not allowed for unrooted shell. + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"imsi-protection-exemption-has-user-approved-for-carrier", "5"}); + verify(mWifiCarrierInfoManager, never()).hasUserApprovedImsiPrivacyExemptionForCarrier( + anyInt()); + assertFalse(mWifiShellCommand.getErrPrintWriter().toString().isEmpty()); + + BinderUtil.setUid(Process.ROOT_UID); + + when(mWifiCarrierInfoManager.hasUserApprovedImsiPrivacyExemptionForCarrier(5)) + .thenReturn(true); + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"imsi-protection-exemption-has-user-approved-for-carrier", "5"}); + verify(mWifiCarrierInfoManager).hasUserApprovedImsiPrivacyExemptionForCarrier(5); + mWifiShellCommand.getOutPrintWriter().toString().contains("yes"); + + when(mWifiCarrierInfoManager.hasUserApprovedImsiPrivacyExemptionForCarrier(5)) + .thenReturn(false); + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"imsi-protection-exemption-has-user-approved-for-carrier", "5"}); + verify(mWifiCarrierInfoManager, times(2)).hasUserApprovedImsiPrivacyExemptionForCarrier(5); + mWifiShellCommand.getOutPrintWriter().toString().contains("no"); + } + + @Test + public void testNetworkRequestsSetUserApproved() { + // not allowed for unrooted shell. + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"network-requests-set-user-approved", TEST_PACKAGE, "yes"}); + verify(mClientModeImpl, never()).setNetworkRequestUserApprovedApp( + anyString(), anyBoolean()); + assertFalse(mWifiShellCommand.getErrPrintWriter().toString().isEmpty()); + + BinderUtil.setUid(Process.ROOT_UID); + + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"network-requests-set-user-approved", TEST_PACKAGE, "yes"}); + verify(mClientModeImpl).setNetworkRequestUserApprovedApp(TEST_PACKAGE, true); + + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"network-requests-set-user-approved", TEST_PACKAGE, "no"}); + verify(mClientModeImpl).setNetworkRequestUserApprovedApp(TEST_PACKAGE, false); + } + + @Test + public void testNetworkRequestsHasUserApproved() { + // not allowed for unrooted shell. + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"network-requests-has-user-approved", TEST_PACKAGE}); + verify(mClientModeImpl, never()).hasNetworkRequestUserApprovedApp(anyString()); + assertFalse(mWifiShellCommand.getErrPrintWriter().toString().isEmpty()); + + BinderUtil.setUid(Process.ROOT_UID); + + when(mClientModeImpl.hasNetworkRequestUserApprovedApp(TEST_PACKAGE)) + .thenReturn(true); + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"network-requests-has-user-approved", TEST_PACKAGE}); + verify(mClientModeImpl).hasNetworkRequestUserApprovedApp(TEST_PACKAGE); + mWifiShellCommand.getOutPrintWriter().toString().contains("yes"); + + when(mClientModeImpl.hasNetworkRequestUserApprovedApp(TEST_PACKAGE)) + .thenReturn(false); + mWifiShellCommand.exec( + new Binder(), new FileDescriptor(), new FileDescriptor(), new FileDescriptor(), + new String[]{"network-requests-has-user-approved", TEST_PACKAGE}); + verify(mClientModeImpl, times(2)).hasNetworkRequestUserApprovedApp(TEST_PACKAGE); + mWifiShellCommand.getOutPrintWriter().toString().contains("no"); + } +} |