119 lines
4.8 KiB
Java
119 lines
4.8 KiB
Java
/*
|
|
* Copyright (C) 2018 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package com.android.settings.security;
|
|
|
|
|
|
import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_ALPHABETIC;
|
|
import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_SOMETHING;
|
|
import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED;
|
|
import static com.android.settings.core.BasePreferenceController.AVAILABLE;
|
|
import static com.android.settings.core.BasePreferenceController.DISABLED_FOR_USER;
|
|
import static com.google.common.truth.Truth.assertThat;
|
|
import static org.mockito.ArgumentMatchers.anyInt;
|
|
import static org.mockito.Mockito.spy;
|
|
import static org.mockito.Mockito.when;
|
|
|
|
import android.arch.lifecycle.LifecycleOwner;
|
|
import android.content.Context;
|
|
import android.content.pm.PackageManager;
|
|
import android.hardware.fingerprint.FingerprintManager;
|
|
import android.os.UserManager;
|
|
|
|
import com.android.internal.widget.LockPatternUtils;
|
|
import com.android.settings.TestConfig;
|
|
import com.android.settings.testutils.FakeFeatureFactory;
|
|
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
|
import com.android.settingslib.core.lifecycle.Lifecycle;
|
|
|
|
import org.junit.Before;
|
|
import org.junit.Test;
|
|
import org.junit.runner.RunWith;
|
|
import org.mockito.Mock;
|
|
import org.mockito.MockitoAnnotations;
|
|
import org.robolectric.RuntimeEnvironment;
|
|
import org.robolectric.annotation.Config;
|
|
import org.robolectric.shadows.ShadowApplication;
|
|
|
|
@RunWith(SettingsRobolectricTestRunner.class)
|
|
@Config(manifest = TestConfig.MANIFEST_PATH, sdk = TestConfig.SDK_VERSION)
|
|
public class VisiblePatternProfilePreferenceControllerTest {
|
|
|
|
private static final int FAKE_PROFILE_USER_ID = 1234;
|
|
|
|
@Mock
|
|
private PackageManager mPackageManager;
|
|
@Mock
|
|
private LockPatternUtils mLockPatternUtils;
|
|
@Mock
|
|
private FingerprintManager mFingerprintManager;
|
|
@Mock
|
|
private UserManager mUm;
|
|
|
|
private Lifecycle mLifecycle;
|
|
private LifecycleOwner mLifecycleOwner;
|
|
private FakeFeatureFactory mFeatureFactory;
|
|
private Context mContext;
|
|
private VisiblePatternProfilePreferenceController mController;
|
|
|
|
@Before
|
|
public void setUp() {
|
|
MockitoAnnotations.initMocks(this);
|
|
mContext = spy(RuntimeEnvironment.application);
|
|
when(mContext.getPackageManager()).thenReturn(mPackageManager);
|
|
when(mPackageManager.hasSystemFeature(PackageManager.FEATURE_FINGERPRINT)).thenReturn(true);
|
|
ShadowApplication.getInstance().setSystemService(Context.FINGERPRINT_SERVICE,
|
|
mFingerprintManager);
|
|
ShadowApplication.getInstance().setSystemService(Context.USER_SERVICE, mUm);
|
|
|
|
mFeatureFactory = FakeFeatureFactory.setupForTest();
|
|
when(mFeatureFactory.securityFeatureProvider.getLockPatternUtils(mContext))
|
|
.thenReturn(mLockPatternUtils);
|
|
when(mUm.getProfileIdsWithDisabled(anyInt())).thenReturn(new int[] {FAKE_PROFILE_USER_ID});
|
|
|
|
mLifecycleOwner = () -> mLifecycle;
|
|
mLifecycle = new Lifecycle(mLifecycleOwner);
|
|
mController = new VisiblePatternProfilePreferenceController(mContext, mLifecycle);
|
|
}
|
|
|
|
@Test
|
|
public void getAvailabilityStatus_notSecure_DISABLED() {
|
|
when(mLockPatternUtils.isSecure(FAKE_PROFILE_USER_ID)).thenReturn(false);
|
|
when(mLockPatternUtils.getKeyguardStoredPasswordQuality(FAKE_PROFILE_USER_ID))
|
|
.thenReturn(PASSWORD_QUALITY_UNSPECIFIED);
|
|
|
|
assertThat(mController.getAvailabilityStatus()).isEqualTo(DISABLED_FOR_USER);
|
|
}
|
|
|
|
@Test
|
|
public void getAvailabilityStatus_secureWithPassword_DISABLED() {
|
|
when(mLockPatternUtils.isSecure(FAKE_PROFILE_USER_ID)).thenReturn(true);
|
|
when(mLockPatternUtils.getKeyguardStoredPasswordQuality(FAKE_PROFILE_USER_ID))
|
|
.thenReturn(PASSWORD_QUALITY_ALPHABETIC);
|
|
|
|
assertThat(mController.getAvailabilityStatus()).isEqualTo(DISABLED_FOR_USER);
|
|
}
|
|
|
|
@Test
|
|
public void getAvailabilityStatus_secureWithPattern_AVAILABLE() {
|
|
when(mLockPatternUtils.isSecure(FAKE_PROFILE_USER_ID)).thenReturn(true);
|
|
when(mLockPatternUtils.getKeyguardStoredPasswordQuality(FAKE_PROFILE_USER_ID))
|
|
.thenReturn(PASSWORD_QUALITY_SOMETHING);
|
|
|
|
assertThat(mController.getAvailabilityStatus()).isEqualTo(AVAILABLE);
|
|
}
|
|
}
|