summaryrefslogtreecommitdiff
path: root/src/components/policy/policy_external/test/policy_manager_impl_ptu_test.cc
diff options
context:
space:
mode:
Diffstat (limited to 'src/components/policy/policy_external/test/policy_manager_impl_ptu_test.cc')
-rw-r--r--src/components/policy/policy_external/test/policy_manager_impl_ptu_test.cc366
1 files changed, 187 insertions, 179 deletions
diff --git a/src/components/policy/policy_external/test/policy_manager_impl_ptu_test.cc b/src/components/policy/policy_external/test/policy_manager_impl_ptu_test.cc
index aa5245825b..5983f3c7c8 100644
--- a/src/components/policy/policy_external/test/policy_manager_impl_ptu_test.cc
+++ b/src/components/policy/policy_external/test/policy_manager_impl_ptu_test.cc
@@ -52,74 +52,74 @@ using ::testing::Return;
using ::testing::ReturnRef;
TEST_F(PolicyManagerImplTest,
- TiggerPTUForNaviAppInCaseNoCertificateExistsInPolicyTable) {
+ DISABLED_TiggerPTUForNaviAppInCaseNoCertificateExistsInPolicyTable) {
EXPECT_CALL(*cache_manager_, GetDeviceConsent(_))
.WillOnce(Return(kDeviceAllowed));
- EXPECT_CALL(*cache_manager_, IsPredataPolicy(_)).WillOnce(Return(false));
- EXPECT_CALL(*cache_manager_, IsApplicationRepresented(_))
- .WillOnce(Return(true));
- EXPECT_CALL(*cache_manager_, GetCertificate()).WillOnce(Return(""));
- EXPECT_CALL(*cache_manager_, AppHasHMIType(_, policy_table::AHT_NAVIGATION))
- .WillOnce(Return(true));
- EXPECT_EQ(manager_->GetPolicyTableStatus(), "UP_TO_DATE");
- manager_->AddApplication(kDefaultId);
- EXPECT_EQ(manager_->GetPolicyTableStatus(), "UPDATE_NEEDED");
-}
+ const uint32_t type = 0;
+ const uint32_t id = 1;
+ const EntityStatus status = kStatusOn;
+ ExternalConsentStatusItem item(type, id, status);
+
+ ExternalConsentStatus external_consent_status;
+ external_consent_status.insert(item);
+
+ GroupsByExternalConsentStatus group;
+ group[item].push_back(std::make_pair<std::string, bool>("group_name", true));
+
+ EXPECT_CALL(*cache_manager_, GetExternalConsentStatus())
+ .WillOnce(Return(external_consent_status));
+
+ EXPECT_CALL(*cache_manager_,
+ GetGroupsWithSameEntities(external_consent_status))
+ .WillOnce(Return(group));
+
+ EXPECT_CALL(*cache_manager_, SetExternalConsentForApp(_));
-TEST_F(PolicyManagerImplTest,
- TiggerPTUForNaviAppInCaseCertificateExistsInPolicyTable) {
- EXPECT_CALL(*cache_manager_, GetDeviceConsent(_))
- .WillOnce(Return(kDeviceAllowed));
EXPECT_CALL(*cache_manager_, IsPredataPolicy(_)).WillOnce(Return(false));
EXPECT_CALL(*cache_manager_, IsApplicationRepresented(_))
.WillOnce(Return(true));
- EXPECT_CALL(*cache_manager_, GetCertificate())
- .WillOnce(Return(
- "Any non empty string is ok here, "
- "because we check that field is not empty"));
-
- EXPECT_CALL(*cache_manager_, AppHasHMIType(_, policy_table::AHT_NAVIGATION))
- .Times(0);
- manager_->AddApplication(kDefaultId);
+ EXPECT_EQ(policy_manager_->GetPolicyTableStatus(), "UP_TO_DATE");
+ policy_manager_->AddApplication(kDefaultId);
+ EXPECT_EQ(policy_manager_->GetPolicyTableStatus(), "UP_TO_DATE");
}
TEST_F(PolicyManagerImplTest2, GetNotificationsNumberAfterPTUpdate) {
// Arrange
Json::Value table = createPTforLoad();
- manager_->ForcePTExchange();
- manager_->OnUpdateStarted();
+ policy_manager_->ForcePTExchange();
+ policy_manager_->OnUpdateStarted();
policy_table::Table update(&table);
update.SetPolicyTableType(rpc::policy_table_interface_base::PT_UPDATE);
// Act
std::string json = table.toStyledString();
::policy::BinaryMessage msg(json.begin(), json.end());
EXPECT_CALL(listener_, OnUpdateStatusChanged(_));
- EXPECT_TRUE(manager_->LoadPT(kFilePtUpdateJson, msg));
- EXPECT_FALSE(manager_->GetCache()->IsPTPreloaded());
+ EXPECT_TRUE(policy_manager_->LoadPT(kFilePtUpdateJson, msg));
+ EXPECT_FALSE(policy_manager_->GetCache()->IsPTPreloaded());
std::string priority = "emergency";
- uint32_t notif_number = manager_->GetNotificationsNumber(priority);
+ uint32_t notif_number = policy_manager_->GetNotificationsNumber(priority);
EXPECT_EQ(1u, notif_number);
priority = "navigation";
- notif_number = manager_->GetNotificationsNumber(priority);
+ notif_number = policy_manager_->GetNotificationsNumber(priority);
EXPECT_EQ(2u, notif_number);
priority = "emergency";
- notif_number = manager_->GetNotificationsNumber(priority);
+ notif_number = policy_manager_->GetNotificationsNumber(priority);
EXPECT_EQ(1u, notif_number);
priority = "VOICECOMM";
- notif_number = manager_->GetNotificationsNumber(priority);
+ notif_number = policy_manager_->GetNotificationsNumber(priority);
EXPECT_EQ(3u, notif_number);
priority = "normal";
- notif_number = manager_->GetNotificationsNumber(priority);
+ notif_number = policy_manager_->GetNotificationsNumber(priority);
EXPECT_EQ(5u, notif_number);
priority = "none";
- notif_number = manager_->GetNotificationsNumber(priority);
+ notif_number = policy_manager_->GetNotificationsNumber(priority);
EXPECT_EQ(6u, notif_number);
}
@@ -136,9 +136,9 @@ TEST_F(PolicyManagerImplTest2, IsAppRevoked_SetRevokedAppID_ExpectAppRevoked) {
ifile.close();
::policy::BinaryMessage msg(json.begin(), json.end());
- ASSERT_TRUE(manager_->LoadPT(kFilePtUpdateJson, msg));
- EXPECT_FALSE(manager_->GetCache()->IsPTPreloaded());
- EXPECT_TRUE(manager_->IsApplicationRevoked(app_id_1_));
+ ASSERT_TRUE(policy_manager_->LoadPT(kFilePtUpdateJson, msg));
+ EXPECT_FALSE(policy_manager_->GetCache()->IsPTPreloaded());
+ EXPECT_TRUE(policy_manager_->IsApplicationRevoked(app_id_1_));
}
TEST_F(
@@ -179,7 +179,7 @@ TEST_F(PolicyManagerImplTest2,
CheckPermissions_SetRevokedAppID_ExpectRPCDisallowed) {
// Arrange
CreateLocalPT(preloadet_pt_filename_);
- policy::CacheManagerInterfaceSPtr cache = manager_->GetCache();
+ policy::CacheManagerInterfaceSPtr cache = policy_manager_->GetCache();
cache->AddDevice(device_id_1_, "Bluetooth");
cache->SetDeviceData(device_id_1_,
"hardware IPX",
@@ -191,9 +191,9 @@ TEST_F(PolicyManagerImplTest2,
"Bluetooth");
EXPECT_CALL(listener_, OnCurrentDeviceIdUpdateRequired(app_id_1_))
.WillRepeatedly(Return(device_id_1_));
- manager_->SetUserConsentForDevice(device_id_1_, true);
+ policy_manager_->SetUserConsentForDevice(device_id_1_, true);
// Add app from consented device. App will be assigned with default policies
- manager_->AddApplication(app_id_1_);
+ policy_manager_->AddApplication(app_id_1_);
// Check before action
policy_table::RpcParameters rpc_parameters;
rpc_parameters.hmi_levels.push_back(policy_table::HL_FULL);
@@ -204,7 +204,7 @@ TEST_F(PolicyManagerImplTest2,
::policy::RPCParams input_params;
::policy::CheckPermissionResult output;
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
app_id_1_, kHmiLevelFull, "Alert", input_params, output);
// Check RPC is allowed
@@ -222,10 +222,10 @@ TEST_F(PolicyManagerImplTest2,
ifile.close();
::policy::BinaryMessage msg(json.begin(), json.end());
- ASSERT_TRUE(manager_->LoadPT(kFilePtUpdateJson, msg));
+ ASSERT_TRUE(policy_manager_->LoadPT(kFilePtUpdateJson, msg));
EXPECT_FALSE(cache->IsPTPreloaded());
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
app_id_1_, kHmiLevelFull, "Alert", input_params, output);
// Check RPC is disallowed
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
@@ -236,8 +236,8 @@ TEST_F(PolicyManagerImplTest2,
CheckPermissions_SetAppIDwithPolicies_ExpectRPCAllowed) {
// Arrange
CreateLocalPT(preloadet_pt_filename_);
- manager_->AddDevice(device_id_1_, "Bluetooth");
- policy::CacheManagerInterfaceSPtr cache = manager_->GetCache();
+ policy_manager_->AddDevice(device_id_1_, "Bluetooth");
+ policy::CacheManagerInterfaceSPtr cache = policy_manager_->GetCache();
ASSERT_TRUE(cache->SetDeviceData(device_id_1_,
"hardware IPX",
@@ -249,9 +249,9 @@ TEST_F(PolicyManagerImplTest2,
"Bluetooth"));
EXPECT_CALL(listener_, OnCurrentDeviceIdUpdateRequired(application_id_))
.WillRepeatedly(Return(device_id_1_));
- manager_->SetUserConsentForDevice(device_id_1_, true);
+ policy_manager_->SetUserConsentForDevice(device_id_1_, true);
// Add app from consented device. App will be assigned with default policies
- manager_->AddApplication(application_id_);
+ policy_manager_->AddApplication(application_id_);
// Emulate PTU with new policies for app added above
std::ifstream ifile(kValidSdlPtUpdateJson);
Json::Reader reader;
@@ -289,7 +289,7 @@ TEST_F(PolicyManagerImplTest2,
::policy::BinaryMessage msg(json.begin(), json.end());
// Load Json to cache
- EXPECT_TRUE(manager_->LoadPT(kFilePtUpdateJson, msg));
+ EXPECT_TRUE(policy_manager_->LoadPT(kFilePtUpdateJson, msg));
EXPECT_FALSE(cache->IsPTPreloaded());
policy_table::RpcParameters rpc_parameters;
@@ -311,7 +311,7 @@ TEST_F(PolicyManagerImplTest2,
"Life",
2,
"Bluetooth");
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelFull, "Alert", input_params, output);
// Check RPC is allowed
EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted);
@@ -334,7 +334,7 @@ TEST_F(PolicyManagerImplTest2,
::policy::RPCParams input_params;
::policy::CheckPermissionResult output;
// Rpc in FULL level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelFull, "SendLocation", input_params, output);
// Check RPC is allowed
EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted);
@@ -344,7 +344,7 @@ TEST_F(PolicyManagerImplTest2,
ResetOutputList(output);
// Rpc in LIMITED level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelLimited, "SendLocation", input_params, output);
// Check RPC is allowed
EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted);
@@ -353,11 +353,11 @@ TEST_F(PolicyManagerImplTest2,
ResetOutputList(output);
// Rpc in BACKGROUND level
- manager_->CheckPermissions(application_id_,
- kHmiLevelBackground,
- "SendLocation",
- input_params,
- output);
+ policy_manager_->CheckPermissions(application_id_,
+ kHmiLevelBackground,
+ "SendLocation",
+ input_params,
+ output);
// Check RPC is allowed
EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted);
ASSERT_TRUE(output.list_of_allowed_params.empty());
@@ -365,7 +365,7 @@ TEST_F(PolicyManagerImplTest2,
ResetOutputList(output);
// Rpc in NONE level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelNone, "SendLocation", input_params, output);
// Check RPC is disallowed
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
@@ -392,7 +392,7 @@ TEST_F(
::policy::CheckPermissionResult output;
// Rpc in FULL level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelFull, "SendLocation", input_params, output);
// Group which has RPC does not require user consent, so its auto-allowed for
@@ -408,7 +408,7 @@ TEST_F(
ResetOutputList(output);
// Rpc in LIMITED level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelLimited, "SendLocation", input_params, output);
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
@@ -420,11 +420,11 @@ TEST_F(
ResetOutputList(output);
// Rpc in BACKGROUND level
- manager_->CheckPermissions(application_id_,
- kHmiLevelBackground,
- "SendLocation",
- input_params,
- output);
+ policy_manager_->CheckPermissions(application_id_,
+ kHmiLevelBackground,
+ "SendLocation",
+ input_params,
+ output);
// Check RPC is allowed
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
@@ -436,7 +436,7 @@ TEST_F(
ResetOutputList(output);
// Rpc in NONE level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelNone, "SendLocation", input_params, output);
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
@@ -467,7 +467,7 @@ TEST_F(PolicyManagerImplTest2,
::policy::CheckPermissionResult output;
// Rpc in FULL level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelFull, "SendLocation", input_params, output);
// Check RPC is allowed
EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted);
@@ -497,7 +497,7 @@ TEST_F(PolicyManagerImplTest2,
output.list_of_undefined_params.clear();
// Rpc in LIMITED level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelLimited, "SendLocation", input_params, output);
// Check RPC is allowed
EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted);
@@ -516,11 +516,11 @@ TEST_F(PolicyManagerImplTest2,
ResetOutputList(output);
// Rpc in BACKGROUND level
- manager_->CheckPermissions(application_id_,
- kHmiLevelBackground,
- "SendLocation",
- input_params,
- output);
+ policy_manager_->CheckPermissions(application_id_,
+ kHmiLevelBackground,
+ "SendLocation",
+ input_params,
+ output);
// Check RPC is allowed
EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted);
@@ -536,7 +536,7 @@ TEST_F(PolicyManagerImplTest2,
ResetOutputList(output);
// Rpc in NONE level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelNone, "SendLocation", input_params, output);
// Check RPC is disallowed
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
@@ -581,7 +581,7 @@ TEST_F(PolicyManagerImplTest2,
::policy::CheckPermissionResult output;
// Rpc in FULL level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelFull, "SendLocation", input_params, output);
// Check RPC is allowed
EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted);
@@ -601,7 +601,7 @@ TEST_F(PolicyManagerImplTest2,
ResetOutputList(output);
// Rpc in LIMITED level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelLimited, "SendLocation", input_params, output);
// Check RPC is allowed
EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted);
@@ -621,11 +621,11 @@ TEST_F(PolicyManagerImplTest2,
ResetOutputList(output);
// Rpc in BACKGROUND level
- manager_->CheckPermissions(application_id_,
- kHmiLevelBackground,
- "SendLocation",
- input_params,
- output);
+ policy_manager_->CheckPermissions(application_id_,
+ kHmiLevelBackground,
+ "SendLocation",
+ input_params,
+ output);
// Check RPC is allowed
EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted);
// Check list of allowed parameters is not empty
@@ -645,7 +645,7 @@ TEST_F(PolicyManagerImplTest2,
ResetOutputList(output);
// Rpc in NONE level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelNone, "SendLocation", input_params, output);
// Check RPC is disallowed
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
@@ -664,8 +664,8 @@ TEST_F(PolicyManagerImplTest2,
// Arrange
CreateLocalPT("json/sdl_preloaded_pt_send_location.json");
- manager_->AddDevice(device_id_1_, "Bluetooth");
- policy::CacheManagerInterfaceSPtr cache = manager_->GetCache();
+ policy_manager_->AddDevice(device_id_1_, "Bluetooth");
+ policy::CacheManagerInterfaceSPtr cache = policy_manager_->GetCache();
ASSERT_TRUE(cache->SetDeviceData(device_id_1_,
"hardware IPX",
"v.8.0.1",
@@ -676,7 +676,7 @@ TEST_F(PolicyManagerImplTest2,
"Bluetooth"));
// Add app from consented device. App will be assigned with default policies
- manager_->AddApplication(application_id_);
+ policy_manager_->AddApplication(application_id_);
std::ifstream ifile("json/sdl_update_pt_2_groups_no_params_in1.json");
Json::Reader reader;
@@ -688,7 +688,7 @@ TEST_F(PolicyManagerImplTest2,
json = root.toStyledString();
ifile.close();
::policy::BinaryMessage msg(json.begin(), json.end());
- EXPECT_TRUE(manager_->LoadPT(kFilePtUpdateJson, msg));
+ EXPECT_TRUE(policy_manager_->LoadPT(kFilePtUpdateJson, msg));
EXPECT_FALSE(cache->IsPTPreloaded());
// Will be called each time permissions are checked
@@ -702,7 +702,7 @@ TEST_F(PolicyManagerImplTest2,
::policy::CheckPermissionResult output;
// Rpc in FULL level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelFull, "SendLocation", input_params, output);
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
@@ -711,7 +711,7 @@ TEST_F(PolicyManagerImplTest2,
ResetOutputList(output);
// Rpc in LIMITED level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelLimited, "SendLocation", input_params, output);
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
@@ -720,11 +720,11 @@ TEST_F(PolicyManagerImplTest2,
ResetOutputList(output);
// Rpc in BACKGROUND level
- manager_->CheckPermissions(application_id_,
- kHmiLevelBackground,
- "SendLocation",
- input_params,
- output);
+ policy_manager_->CheckPermissions(application_id_,
+ kHmiLevelBackground,
+ "SendLocation",
+ input_params,
+ output);
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
EXPECT_TRUE(output.list_of_allowed_params.empty());
@@ -733,7 +733,7 @@ TEST_F(PolicyManagerImplTest2,
ResetOutputList(output);
// Rpc in NONE level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelNone, "SendLocation", input_params, output);
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
@@ -750,8 +750,8 @@ TEST_F(PolicyManagerImplTest2,
// Arrange
CreateLocalPT("json/sdl_preloaded_pt_send_location.json");
- manager_->AddDevice(device_id_1_, "Bluetooth");
- policy::CacheManagerInterfaceSPtr cache = manager_->GetCache();
+ policy_manager_->AddDevice(device_id_1_, "Bluetooth");
+ policy::CacheManagerInterfaceSPtr cache = policy_manager_->GetCache();
ASSERT_TRUE(cache->SetDeviceData(device_id_1_,
"hardware IPX",
"v.8.0.1",
@@ -762,7 +762,7 @@ TEST_F(PolicyManagerImplTest2,
"Bluetooth"));
// Add app from consented device. App will be assigned with default policies
- manager_->AddApplication(application_id_);
+ policy_manager_->AddApplication(application_id_);
std::ifstream ifile(
"json/sdl_update_pt_2_groups_no_params_in1_omitted_in2.json");
@@ -775,7 +775,7 @@ TEST_F(PolicyManagerImplTest2,
json = root.toStyledString();
ifile.close();
::policy::BinaryMessage msg(json.begin(), json.end());
- EXPECT_TRUE(manager_->LoadPT(kFilePtUpdateJson, msg));
+ EXPECT_TRUE(policy_manager_->LoadPT(kFilePtUpdateJson, msg));
EXPECT_FALSE(cache->IsPTPreloaded());
// Will be called each time permissions are checked
@@ -789,7 +789,7 @@ TEST_F(PolicyManagerImplTest2,
::policy::CheckPermissionResult output;
// Rpc in FULL level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelFull, "SendLocation", input_params, output);
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
@@ -798,7 +798,7 @@ TEST_F(PolicyManagerImplTest2,
ResetOutputList(output);
// Rpc in LIMITED level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelLimited, "SendLocation", input_params, output);
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
EXPECT_TRUE(output.list_of_allowed_params.empty());
@@ -806,11 +806,11 @@ TEST_F(PolicyManagerImplTest2,
ResetOutputList(output);
// Rpc in BACKGROUND level
- manager_->CheckPermissions(application_id_,
- kHmiLevelBackground,
- "SendLocation",
- input_params,
- output);
+ policy_manager_->CheckPermissions(application_id_,
+ kHmiLevelBackground,
+ "SendLocation",
+ input_params,
+ output);
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
EXPECT_TRUE(output.list_of_allowed_params.empty());
EXPECT_EQ(10u, output.list_of_undefined_params.size());
@@ -818,7 +818,7 @@ TEST_F(PolicyManagerImplTest2,
ResetOutputList(output);
// Rpc in NONE level
- manager_->CheckPermissions(
+ policy_manager_->CheckPermissions(
application_id_, kHmiLevelNone, "SendLocation", input_params, output);
EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted);
EXPECT_TRUE(output.list_of_allowed_params.empty());
@@ -828,8 +828,8 @@ TEST_F(PolicyManagerImplTest2,
TEST_F(PolicyManagerImplTest, LoadPT_SetInvalidUpdatePT_PTIsNotLoaded) {
// Arrange
- manager_->ForcePTExchange();
- manager_->OnUpdateStarted();
+ policy_manager_->ForcePTExchange();
+ policy_manager_->OnUpdateStarted();
Json::Value table(Json::objectValue);
policy_table::Table update(&table);
@@ -850,9 +850,9 @@ TEST_F(PolicyManagerImplTest, LoadPT_SetInvalidUpdatePT_PTIsNotLoaded) {
EXPECT_CALL(*cache_manager_, SaveUpdateRequired(false)).Times(0);
EXPECT_CALL(*cache_manager_, TimeoutResponse()).Times(0);
EXPECT_CALL(*cache_manager_, SecondsBetweenRetries(_)).Times(0);
- EXPECT_FALSE(manager_->LoadPT(kFilePtUpdateJson, msg));
+ EXPECT_FALSE(policy_manager_->LoadPT(kFilePtUpdateJson, msg));
EXPECT_CALL(*cache_manager_, IsPTPreloaded());
- EXPECT_FALSE(manager_->GetCache()->IsPTPreloaded());
+ EXPECT_FALSE(policy_manager_->GetCache()->IsPTPreloaded());
}
TEST_F(
@@ -860,13 +860,13 @@ TEST_F(
AddApplication_AddExistingApplicationFromDeviceWithoutConsent_ExpectNoUpdateRequired) {
// Arrange
CreateLocalPT(preloadet_pt_filename_);
- EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus());
+ EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus());
GetPTU(kValidSdlPtUpdateJson);
- EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus());
+ EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus());
// Try to add existing app
- manager_->AddApplication(app_id_2_);
+ policy_manager_->AddApplication(app_id_2_);
// Check no update required
- EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus());
+ EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus());
}
uint32_t GetCurrentDaysCount() {
@@ -880,19 +880,19 @@ TEST_F(PolicyManagerImplTest2,
// Arrange
CreateLocalPT(preloadet_pt_filename_);
const uint32_t days = GetCurrentDaysCount();
- EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus());
+ EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus());
GetPTU(kValidSdlPtUpdateJson);
- EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus());
+ EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus());
- manager_->AddApplication(app_id_2_);
- EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus());
+ policy_manager_->AddApplication(app_id_2_);
+ EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus());
::policy::Counters counter = ::policy::Counters::DAYS_AFTER_EPOCH;
// Set PT was updated 10 days ago (limit is 30 days for now)
// So no limit exceeded
- manager_->PTUpdatedAt(counter, days - 10);
- manager_->OnAppRegisteredOnMobile(app_id_2_);
- EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus());
+ policy_manager_->PTUpdatedAt(counter, days - 10);
+ policy_manager_->OnAppRegisteredOnMobile(app_id_2_);
+ EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus());
}
TEST_F(PolicyManagerImplTest2,
@@ -900,17 +900,17 @@ TEST_F(PolicyManagerImplTest2,
// Arrange
CreateLocalPT(preloadet_pt_filename_);
const uint32_t days = GetCurrentDaysCount();
- EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus());
+ EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus());
GetPTU(kValidSdlPtUpdateJson);
- EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus());
+ EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus());
- manager_->AddApplication(app_id_2_);
- EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus());
+ policy_manager_->AddApplication(app_id_2_);
+ EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus());
::policy::Counters counter = ::policy::Counters::DAYS_AFTER_EPOCH;
// Set PT was updated 50 days ago (limit is 30 days for now)
- manager_->PTUpdatedAt(counter, days - 50);
- manager_->OnAppRegisteredOnMobile(app_id_2_);
- EXPECT_EQ("UPDATE_NEEDED", manager_->GetPolicyTableStatus());
+ policy_manager_->PTUpdatedAt(counter, days - 50);
+ policy_manager_->OnAppRegisteredOnMobile(app_id_2_);
+ EXPECT_EQ("UPDATE_NEEDED", policy_manager_->GetPolicyTableStatus());
}
TEST_F(
@@ -919,33 +919,35 @@ TEST_F(
// Arrange
CreateLocalPT(preloadet_pt_filename_);
const uint32_t days = GetCurrentDaysCount();
- EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus());
+ EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus());
GetPTU(kValidSdlPtUpdateJson);
- EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus());
+ EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus());
// Try to add existing app
- manager_->AddApplication(app_id_2_);
- EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus());
+ policy_manager_->AddApplication(app_id_2_);
+ EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus());
::policy::Counters counter = ::policy::Counters::DAYS_AFTER_EPOCH;
// Set PT was updated 10 days ago (limit is 30 days for now)
// So no limit exceeded
- manager_->PTUpdatedAt(counter, days - 10);
- int ign_cycles = (manager_->GetCache())->IgnitionCyclesBeforeExchange();
+ policy_manager_->PTUpdatedAt(counter, days - 10);
+ int ign_cycles =
+ (policy_manager_->GetCache())->IgnitionCyclesBeforeExchange();
// Set ignition cycles to value = 99 (limit is 100 which initiates auto
// PTExchange)
for (int i = 0; i < ign_cycles; ++i) {
- manager_->IncrementIgnitionCycles();
+ policy_manager_->IncrementIgnitionCycles();
}
- manager_->OnAppRegisteredOnMobile(app_id_2_);
+ policy_manager_->OnAppRegisteredOnMobile(app_id_2_);
// Check update required
- EXPECT_EQ("UPDATE_NEEDED", manager_->GetPolicyTableStatus());
+ EXPECT_EQ("UPDATE_NEEDED", policy_manager_->GetPolicyTableStatus());
}
TEST_F(PolicyManagerImplTest2,
GetUserConsentForApp_SetUserConsentForApp_ExpectReceivedConsentCorrect) {
// Arrange
CreateLocalPT(preloadet_pt_filename_);
- ASSERT_TRUE((manager_->GetCache())->AddDevice(device_id_2_, "Bluetooth"));
- ASSERT_TRUE((manager_->GetCache())
+ ASSERT_TRUE(
+ (policy_manager_->GetCache())->AddDevice(device_id_2_, "Bluetooth"));
+ ASSERT_TRUE((policy_manager_->GetCache())
->SetDeviceData(device_id_2_,
"hardware IPX",
"v.8.0.1",
@@ -959,13 +961,13 @@ TEST_F(PolicyManagerImplTest2,
::policy::StringArray disallowed_groups;
consented_groups.push_back(std::string("Notifications"));
consented_groups.push_back(std::string("Notifications"));
- (manager_->GetCache())
+ (policy_manager_->GetCache())
->SetUserPermissionsForDevice(
device_id_2_, consented_groups, disallowed_groups);
- manager_->SetUserConsentForDevice(device_id_2_, true);
+ policy_manager_->SetUserConsentForDevice(device_id_2_, true);
EXPECT_CALL(listener_, OnCurrentDeviceIdUpdateRequired(app_id_2_))
.WillRepeatedly(Return(device_id_2_));
- manager_->AddApplication(app_id_2_);
+ policy_manager_->AddApplication(app_id_2_);
GetPTU(kValidSdlPtUpdateJson);
::policy::PermissionConsent perm_consent;
@@ -983,11 +985,11 @@ TEST_F(PolicyManagerImplTest2,
groups_permissions.push_back(group1_perm);
perm_consent.group_permissions = groups_permissions;
- manager_->SetUserConsentForApp(perm_consent);
- manager_->SendNotificationOnPermissionsUpdated(app_id_2_);
+ policy_manager_->SetUserConsentForApp(perm_consent);
+ policy_manager_->SendNotificationOnPermissionsUpdated(app_id_2_);
std::vector< ::policy::FunctionalGroupPermission> actual_groups_permissions;
std::vector< ::policy::FunctionalGroupPermission>::iterator it;
- manager_->GetUserConsentForApp(
+ policy_manager_->GetUserConsentForApp(
device_id_2_, app_id_2_, actual_groups_permissions);
uint32_t index = 0;
for (; index < actual_groups_permissions.size(); ++index) {
@@ -1008,20 +1010,20 @@ TEST_F(PolicyManagerImplTest2,
CanAppKeepContext_SetPoliciesForAppUpdated_ExpectAppCanKeepContext) {
// Arrange
CreateLocalPT(preloadet_pt_filename_);
- manager_->AddApplication(app_id_2_);
+ policy_manager_->AddApplication(app_id_2_);
GetPTU(kValidSdlPtUpdateJson);
// Check keep context in updated policies for app
- EXPECT_TRUE(manager_->CanAppKeepContext(app_id_2_));
+ EXPECT_TRUE(policy_manager_->CanAppKeepContext(app_id_2_));
}
TEST_F(PolicyManagerImplTest2,
CanAppStealFocus_SetPoliciesForAppUpdated_ExpectAppCanStealFocus) {
// Arrange
CreateLocalPT(preloadet_pt_filename_);
- manager_->AddApplication(app_id_2_);
+ policy_manager_->AddApplication(app_id_2_);
GetPTU(kValidSdlPtUpdateJson);
// Check keep context in updated policies for app
- EXPECT_TRUE(manager_->CanAppKeepContext(app_id_2_));
+ EXPECT_TRUE(policy_manager_->CanAppKeepContext(app_id_2_));
}
TEST_F(PolicyManagerImplTest2,
@@ -1029,9 +1031,10 @@ TEST_F(PolicyManagerImplTest2,
// Arrange
CreateLocalPT(preloadet_pt_filename_);
GetPTU(kValidSdlPtUpdateJson);
- utils::SharedPtr<policy_table::Table> pt = (manager_->GetCache())->GetPT();
+ utils::SharedPtr<policy_table::Table> pt =
+ (policy_manager_->GetCache())->GetPT();
policy_table::ModuleConfig& module_config = pt->policy_table.module_config;
- ::policy::VehicleInfo vehicle_info = manager_->GetVehicleInfo();
+ ::policy::VehicleInfo vehicle_info = policy_manager_->GetVehicleInfo();
EXPECT_EQ(static_cast<std::string>(*module_config.vehicle_make),
vehicle_info.vehicle_make);
@@ -1047,8 +1050,9 @@ TEST_F(
// Arrange
CreateLocalPT(preloadet_pt_filename_);
- ASSERT_TRUE((manager_->GetCache())->AddDevice(device_id_2_, "Bluetooth"));
- ASSERT_TRUE((manager_->GetCache())
+ ASSERT_TRUE(
+ (policy_manager_->GetCache())->AddDevice(device_id_2_, "Bluetooth"));
+ ASSERT_TRUE((policy_manager_->GetCache())
->SetDeviceData(device_id_2_,
"hardware IPX",
"v.8.0.1",
@@ -1061,13 +1065,13 @@ TEST_F(
::policy::StringArray consented_groups;
::policy::StringArray disallowed_groups;
consented_groups.push_back(std::string("Notifications"));
- (manager_->GetCache())
+ (policy_manager_->GetCache())
->SetUserPermissionsForDevice(
device_id_2_, consented_groups, disallowed_groups);
- manager_->SetUserConsentForDevice(device_id_2_, true);
+ policy_manager_->SetUserConsentForDevice(device_id_2_, true);
EXPECT_CALL(listener_, OnCurrentDeviceIdUpdateRequired(app_id_2_))
.WillRepeatedly(Return(device_id_2_));
- manager_->AddApplication(app_id_2_);
+ policy_manager_->AddApplication(app_id_2_);
GetPTU(kValidSdlPtUpdateJson);
::policy::PermissionConsent perm_consent;
@@ -1085,11 +1089,11 @@ TEST_F(
groups_permissions.push_back(group1_perm);
perm_consent.group_permissions = groups_permissions;
- manager_->SetUserConsentForApp(perm_consent);
- manager_->SendNotificationOnPermissionsUpdated(app_id_2_);
+ policy_manager_->SetUserConsentForApp(perm_consent);
+ policy_manager_->SendNotificationOnPermissionsUpdated(app_id_2_);
std::vector< ::policy::FunctionalGroupPermission> actual_groups_permissions;
std::vector< ::policy::FunctionalGroupPermission>::iterator it;
- manager_->GetPermissionsForApp(
+ policy_manager_->GetPermissionsForApp(
device_id_2_, app_id_2_, actual_groups_permissions);
uint32_t index = 0;
for (; index < actual_groups_permissions.size(); ++index) {
@@ -1112,15 +1116,16 @@ TEST_F(
// Arrange
CreateLocalPT(preloadet_pt_filename_);
- manager_->AddApplication(app_id_3_);
- ::policy::StringArray app_requests = manager_->GetAppRequestTypes(app_id_3_);
+ policy_manager_->AddApplication(app_id_3_);
+ ::policy::StringArray app_requests =
+ policy_manager_->GetAppRequestTypes(app_id_3_);
EXPECT_EQ(1u, app_requests.size());
Json::Value root = GetPTU(kPtuRequestTypeJson);
Json::Value request_Types = Json::Value(Json::arrayValue);
request_Types =
root["policy_table"]["app_policies"][app_id_3_]["RequestType"];
- app_requests = manager_->GetAppRequestTypes(app_id_3_);
+ app_requests = policy_manager_->GetAppRequestTypes(app_id_3_);
EXPECT_EQ(request_Types.size(), app_requests.size());
// Check nicknames match
for (uint32_t i = 0; i < request_Types.size(); ++i) {
@@ -1133,7 +1138,8 @@ TEST_F(
HertBeatTimeout_AddApp_UpdateAppPolicies_ExpectReceivedHertBeatTimeoutCorrect) {
// Arrange
CreateLocalPT(preloadet_pt_filename_);
- utils::SharedPtr<policy_table::Table> pt = (manager_->GetCache())->GetPT();
+ utils::SharedPtr<policy_table::Table> pt =
+ (policy_manager_->GetCache())->GetPT();
::policy_table::PolicyTableType type1 =
::policy_table::PolicyTableType::PT_PRELOADED;
pt->SetPolicyTableType(type1);
@@ -1144,8 +1150,8 @@ TEST_F(
pt->ReportErrors(&report);
}
// Add new app
- manager_->AddApplication(app_id_2_);
- uint32_t result = manager_->HeartBeatTimeout(app_id_2_);
+ policy_manager_->AddApplication(app_id_2_);
+ uint32_t result = policy_manager_->HeartBeatTimeout(app_id_2_);
// By default hertbeat timeout is 0
EXPECT_EQ(0u, result);
Json::Value root = GetPTU(kValidSdlPtUpdateJson);
@@ -1163,7 +1169,7 @@ TEST_F(
Json::Value heart_beat_timeout = Json::Value(Json::uintValue);
heart_beat_timeout =
root["policy_table"]["app_policies"][app_id_2_]["heart_beat_timeout_ms"];
- result = manager_->HeartBeatTimeout(app_id_2_);
+ result = policy_manager_->HeartBeatTimeout(app_id_2_);
EXPECT_EQ(heart_beat_timeout.asUInt(), result);
}
@@ -1171,8 +1177,9 @@ TEST_F(PolicyManagerImplTest2,
RemoveAppConsentForGroup_SetUserConsentForApp_ExpectAppConsentDeleted) {
// Arrange
CreateLocalPT(preloadet_pt_filename_);
- ASSERT_TRUE((manager_->GetCache())->AddDevice(device_id_2_, "Bluetooth"));
- ASSERT_TRUE((manager_->GetCache())
+ ASSERT_TRUE(
+ (policy_manager_->GetCache())->AddDevice(device_id_2_, "Bluetooth"));
+ ASSERT_TRUE((policy_manager_->GetCache())
->SetDeviceData(device_id_2_,
"hardware IPX",
"v.8.0.1",
@@ -1185,13 +1192,13 @@ TEST_F(PolicyManagerImplTest2,
::policy::StringArray consented_groups;
::policy::StringArray disallowed_groups;
consented_groups.push_back(std::string("Notifications"));
- (manager_->GetCache())
+ (policy_manager_->GetCache())
->SetUserPermissionsForDevice(
device_id_2_, consented_groups, disallowed_groups);
- manager_->SetUserConsentForDevice(device_id_2_, true);
+ policy_manager_->SetUserConsentForDevice(device_id_2_, true);
EXPECT_CALL(listener_, OnCurrentDeviceIdUpdateRequired(app_id_2_))
.WillRepeatedly(Return(device_id_2_));
- manager_->AddApplication(app_id_2_);
+ policy_manager_->AddApplication(app_id_2_);
GetPTU(kValidSdlPtUpdateJson);
::policy::PermissionConsent perm_consent;
@@ -1209,11 +1216,11 @@ TEST_F(PolicyManagerImplTest2,
groups_permissions.push_back(group1_perm);
perm_consent.group_permissions = groups_permissions;
- manager_->SetUserConsentForApp(perm_consent);
- manager_->SendNotificationOnPermissionsUpdated(app_id_2_);
+ policy_manager_->SetUserConsentForApp(perm_consent);
+ policy_manager_->SendNotificationOnPermissionsUpdated(app_id_2_);
std::vector< ::policy::FunctionalGroupPermission> actual_groups_permissions;
std::vector< ::policy::FunctionalGroupPermission>::iterator it;
- manager_->GetPermissionsForApp(
+ policy_manager_->GetPermissionsForApp(
device_id_2_, app_id_2_, actual_groups_permissions);
uint32_t index = 0;
for (; index < actual_groups_permissions.size(); ++index) {
@@ -1228,7 +1235,8 @@ TEST_F(PolicyManagerImplTest2,
actual_groups_permissions[index].group_name);
EXPECT_EQ(group1_perm.group_id, actual_groups_permissions[index].group_id);
EXPECT_EQ(group1_perm.state, actual_groups_permissions[index].state);
- utils::SharedPtr<policy_table::Table> pt = (manager_->GetCache())->GetPT();
+ utils::SharedPtr<policy_table::Table> pt =
+ (policy_manager_->GetCache())->GetPT();
uint32_t ucr_size = 0;
::policy_table::DeviceData& device_data = *pt->policy_table.device_data;
::policy_table::DeviceData::const_iterator dev_data_iter =
@@ -1244,7 +1252,7 @@ TEST_F(PolicyManagerImplTest2,
if (ucr_iter != ucr.end()) {
EXPECT_TRUE((*(ucr_iter->second.consent_groups)).find("Notifications") !=
(*(ucr_iter->second.consent_groups)).end());
- manager_->RemoveAppConsentForGroup(app_id_2_, "Notifications");
+ policy_manager_->RemoveAppConsentForGroup(app_id_2_, "Notifications");
EXPECT_TRUE((*(ucr_iter->second.consent_groups)).find("Notifications") ==
(*(ucr_iter->second.consent_groups)).end());
}
@@ -1263,10 +1271,10 @@ TEST_F(PolicyManagerImplTest2,
// permissions, request type etc.
EXPECT_CALL(listener_, OnCurrentDeviceIdUpdateRequired(app_id_2_))
.WillRepeatedly(Return(device_id_1_));
- manager_->SetUserConsentForDevice(device_id_1_, true);
+ policy_manager_->SetUserConsentForDevice(device_id_1_, true);
// Add app
- manager_->AddApplication(section_name);
+ policy_manager_->AddApplication(section_name);
EXPECT_CALL(listener_, OnPendingPermissionChange(section_name)).Times(2);
// PTU has single invalid RequestTypes, which must be dropped and replaced
@@ -1275,18 +1283,18 @@ TEST_F(PolicyManagerImplTest2,
// Get RequestTypes from <app_id> section of app policies after PT update
::policy::StringArray app_request_types_after =
- manager_->GetAppRequestTypes(section_name);
+ policy_manager_->GetAppRequestTypes(section_name);
EXPECT_CALL(listener_, OnCurrentDeviceIdUpdateRequired(kDefaultId))
.WillOnce(Return(device_id_1_));
::policy::StringArray default_request_types_after =
- manager_->GetAppRequestTypes(kDefaultId);
+ policy_manager_->GetAppRequestTypes(kDefaultId);
// Check sizes of Request types of PT and PTU
EXPECT_EQ(4u, app_request_types_after.size());
::policy::AppPermissions permissions =
- manager_->GetAppPermissionsChanges(section_name);
+ policy_manager_->GetAppPermissionsChanges(section_name);
EXPECT_TRUE(permissions.requestTypeChanged);
policy_table::RequestType temp_res1;