diff options
Diffstat (limited to 'src/components/policy/policy_external/test/policy_manager_impl_ptu_test.cc')
-rw-r--r-- | src/components/policy/policy_external/test/policy_manager_impl_ptu_test.cc | 366 |
1 files changed, 187 insertions, 179 deletions
diff --git a/src/components/policy/policy_external/test/policy_manager_impl_ptu_test.cc b/src/components/policy/policy_external/test/policy_manager_impl_ptu_test.cc index aa5245825b..5983f3c7c8 100644 --- a/src/components/policy/policy_external/test/policy_manager_impl_ptu_test.cc +++ b/src/components/policy/policy_external/test/policy_manager_impl_ptu_test.cc @@ -52,74 +52,74 @@ using ::testing::Return; using ::testing::ReturnRef; TEST_F(PolicyManagerImplTest, - TiggerPTUForNaviAppInCaseNoCertificateExistsInPolicyTable) { + DISABLED_TiggerPTUForNaviAppInCaseNoCertificateExistsInPolicyTable) { EXPECT_CALL(*cache_manager_, GetDeviceConsent(_)) .WillOnce(Return(kDeviceAllowed)); - EXPECT_CALL(*cache_manager_, IsPredataPolicy(_)).WillOnce(Return(false)); - EXPECT_CALL(*cache_manager_, IsApplicationRepresented(_)) - .WillOnce(Return(true)); - EXPECT_CALL(*cache_manager_, GetCertificate()).WillOnce(Return("")); - EXPECT_CALL(*cache_manager_, AppHasHMIType(_, policy_table::AHT_NAVIGATION)) - .WillOnce(Return(true)); - EXPECT_EQ(manager_->GetPolicyTableStatus(), "UP_TO_DATE"); - manager_->AddApplication(kDefaultId); - EXPECT_EQ(manager_->GetPolicyTableStatus(), "UPDATE_NEEDED"); -} + const uint32_t type = 0; + const uint32_t id = 1; + const EntityStatus status = kStatusOn; + ExternalConsentStatusItem item(type, id, status); + + ExternalConsentStatus external_consent_status; + external_consent_status.insert(item); + + GroupsByExternalConsentStatus group; + group[item].push_back(std::make_pair<std::string, bool>("group_name", true)); + + EXPECT_CALL(*cache_manager_, GetExternalConsentStatus()) + .WillOnce(Return(external_consent_status)); + + EXPECT_CALL(*cache_manager_, + GetGroupsWithSameEntities(external_consent_status)) + .WillOnce(Return(group)); + + EXPECT_CALL(*cache_manager_, SetExternalConsentForApp(_)); -TEST_F(PolicyManagerImplTest, - TiggerPTUForNaviAppInCaseCertificateExistsInPolicyTable) { - EXPECT_CALL(*cache_manager_, GetDeviceConsent(_)) - .WillOnce(Return(kDeviceAllowed)); EXPECT_CALL(*cache_manager_, IsPredataPolicy(_)).WillOnce(Return(false)); EXPECT_CALL(*cache_manager_, IsApplicationRepresented(_)) .WillOnce(Return(true)); - EXPECT_CALL(*cache_manager_, GetCertificate()) - .WillOnce(Return( - "Any non empty string is ok here, " - "because we check that field is not empty")); - - EXPECT_CALL(*cache_manager_, AppHasHMIType(_, policy_table::AHT_NAVIGATION)) - .Times(0); - manager_->AddApplication(kDefaultId); + EXPECT_EQ(policy_manager_->GetPolicyTableStatus(), "UP_TO_DATE"); + policy_manager_->AddApplication(kDefaultId); + EXPECT_EQ(policy_manager_->GetPolicyTableStatus(), "UP_TO_DATE"); } TEST_F(PolicyManagerImplTest2, GetNotificationsNumberAfterPTUpdate) { // Arrange Json::Value table = createPTforLoad(); - manager_->ForcePTExchange(); - manager_->OnUpdateStarted(); + policy_manager_->ForcePTExchange(); + policy_manager_->OnUpdateStarted(); policy_table::Table update(&table); update.SetPolicyTableType(rpc::policy_table_interface_base::PT_UPDATE); // Act std::string json = table.toStyledString(); ::policy::BinaryMessage msg(json.begin(), json.end()); EXPECT_CALL(listener_, OnUpdateStatusChanged(_)); - EXPECT_TRUE(manager_->LoadPT(kFilePtUpdateJson, msg)); - EXPECT_FALSE(manager_->GetCache()->IsPTPreloaded()); + EXPECT_TRUE(policy_manager_->LoadPT(kFilePtUpdateJson, msg)); + EXPECT_FALSE(policy_manager_->GetCache()->IsPTPreloaded()); std::string priority = "emergency"; - uint32_t notif_number = manager_->GetNotificationsNumber(priority); + uint32_t notif_number = policy_manager_->GetNotificationsNumber(priority); EXPECT_EQ(1u, notif_number); priority = "navigation"; - notif_number = manager_->GetNotificationsNumber(priority); + notif_number = policy_manager_->GetNotificationsNumber(priority); EXPECT_EQ(2u, notif_number); priority = "emergency"; - notif_number = manager_->GetNotificationsNumber(priority); + notif_number = policy_manager_->GetNotificationsNumber(priority); EXPECT_EQ(1u, notif_number); priority = "VOICECOMM"; - notif_number = manager_->GetNotificationsNumber(priority); + notif_number = policy_manager_->GetNotificationsNumber(priority); EXPECT_EQ(3u, notif_number); priority = "normal"; - notif_number = manager_->GetNotificationsNumber(priority); + notif_number = policy_manager_->GetNotificationsNumber(priority); EXPECT_EQ(5u, notif_number); priority = "none"; - notif_number = manager_->GetNotificationsNumber(priority); + notif_number = policy_manager_->GetNotificationsNumber(priority); EXPECT_EQ(6u, notif_number); } @@ -136,9 +136,9 @@ TEST_F(PolicyManagerImplTest2, IsAppRevoked_SetRevokedAppID_ExpectAppRevoked) { ifile.close(); ::policy::BinaryMessage msg(json.begin(), json.end()); - ASSERT_TRUE(manager_->LoadPT(kFilePtUpdateJson, msg)); - EXPECT_FALSE(manager_->GetCache()->IsPTPreloaded()); - EXPECT_TRUE(manager_->IsApplicationRevoked(app_id_1_)); + ASSERT_TRUE(policy_manager_->LoadPT(kFilePtUpdateJson, msg)); + EXPECT_FALSE(policy_manager_->GetCache()->IsPTPreloaded()); + EXPECT_TRUE(policy_manager_->IsApplicationRevoked(app_id_1_)); } TEST_F( @@ -179,7 +179,7 @@ TEST_F(PolicyManagerImplTest2, CheckPermissions_SetRevokedAppID_ExpectRPCDisallowed) { // Arrange CreateLocalPT(preloadet_pt_filename_); - policy::CacheManagerInterfaceSPtr cache = manager_->GetCache(); + policy::CacheManagerInterfaceSPtr cache = policy_manager_->GetCache(); cache->AddDevice(device_id_1_, "Bluetooth"); cache->SetDeviceData(device_id_1_, "hardware IPX", @@ -191,9 +191,9 @@ TEST_F(PolicyManagerImplTest2, "Bluetooth"); EXPECT_CALL(listener_, OnCurrentDeviceIdUpdateRequired(app_id_1_)) .WillRepeatedly(Return(device_id_1_)); - manager_->SetUserConsentForDevice(device_id_1_, true); + policy_manager_->SetUserConsentForDevice(device_id_1_, true); // Add app from consented device. App will be assigned with default policies - manager_->AddApplication(app_id_1_); + policy_manager_->AddApplication(app_id_1_); // Check before action policy_table::RpcParameters rpc_parameters; rpc_parameters.hmi_levels.push_back(policy_table::HL_FULL); @@ -204,7 +204,7 @@ TEST_F(PolicyManagerImplTest2, ::policy::RPCParams input_params; ::policy::CheckPermissionResult output; - manager_->CheckPermissions( + policy_manager_->CheckPermissions( app_id_1_, kHmiLevelFull, "Alert", input_params, output); // Check RPC is allowed @@ -222,10 +222,10 @@ TEST_F(PolicyManagerImplTest2, ifile.close(); ::policy::BinaryMessage msg(json.begin(), json.end()); - ASSERT_TRUE(manager_->LoadPT(kFilePtUpdateJson, msg)); + ASSERT_TRUE(policy_manager_->LoadPT(kFilePtUpdateJson, msg)); EXPECT_FALSE(cache->IsPTPreloaded()); - manager_->CheckPermissions( + policy_manager_->CheckPermissions( app_id_1_, kHmiLevelFull, "Alert", input_params, output); // Check RPC is disallowed EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); @@ -236,8 +236,8 @@ TEST_F(PolicyManagerImplTest2, CheckPermissions_SetAppIDwithPolicies_ExpectRPCAllowed) { // Arrange CreateLocalPT(preloadet_pt_filename_); - manager_->AddDevice(device_id_1_, "Bluetooth"); - policy::CacheManagerInterfaceSPtr cache = manager_->GetCache(); + policy_manager_->AddDevice(device_id_1_, "Bluetooth"); + policy::CacheManagerInterfaceSPtr cache = policy_manager_->GetCache(); ASSERT_TRUE(cache->SetDeviceData(device_id_1_, "hardware IPX", @@ -249,9 +249,9 @@ TEST_F(PolicyManagerImplTest2, "Bluetooth")); EXPECT_CALL(listener_, OnCurrentDeviceIdUpdateRequired(application_id_)) .WillRepeatedly(Return(device_id_1_)); - manager_->SetUserConsentForDevice(device_id_1_, true); + policy_manager_->SetUserConsentForDevice(device_id_1_, true); // Add app from consented device. App will be assigned with default policies - manager_->AddApplication(application_id_); + policy_manager_->AddApplication(application_id_); // Emulate PTU with new policies for app added above std::ifstream ifile(kValidSdlPtUpdateJson); Json::Reader reader; @@ -289,7 +289,7 @@ TEST_F(PolicyManagerImplTest2, ::policy::BinaryMessage msg(json.begin(), json.end()); // Load Json to cache - EXPECT_TRUE(manager_->LoadPT(kFilePtUpdateJson, msg)); + EXPECT_TRUE(policy_manager_->LoadPT(kFilePtUpdateJson, msg)); EXPECT_FALSE(cache->IsPTPreloaded()); policy_table::RpcParameters rpc_parameters; @@ -311,7 +311,7 @@ TEST_F(PolicyManagerImplTest2, "Life", 2, "Bluetooth"); - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelFull, "Alert", input_params, output); // Check RPC is allowed EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted); @@ -334,7 +334,7 @@ TEST_F(PolicyManagerImplTest2, ::policy::RPCParams input_params; ::policy::CheckPermissionResult output; // Rpc in FULL level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelFull, "SendLocation", input_params, output); // Check RPC is allowed EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted); @@ -344,7 +344,7 @@ TEST_F(PolicyManagerImplTest2, ResetOutputList(output); // Rpc in LIMITED level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelLimited, "SendLocation", input_params, output); // Check RPC is allowed EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted); @@ -353,11 +353,11 @@ TEST_F(PolicyManagerImplTest2, ResetOutputList(output); // Rpc in BACKGROUND level - manager_->CheckPermissions(application_id_, - kHmiLevelBackground, - "SendLocation", - input_params, - output); + policy_manager_->CheckPermissions(application_id_, + kHmiLevelBackground, + "SendLocation", + input_params, + output); // Check RPC is allowed EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted); ASSERT_TRUE(output.list_of_allowed_params.empty()); @@ -365,7 +365,7 @@ TEST_F(PolicyManagerImplTest2, ResetOutputList(output); // Rpc in NONE level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelNone, "SendLocation", input_params, output); // Check RPC is disallowed EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); @@ -392,7 +392,7 @@ TEST_F( ::policy::CheckPermissionResult output; // Rpc in FULL level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelFull, "SendLocation", input_params, output); // Group which has RPC does not require user consent, so its auto-allowed for @@ -408,7 +408,7 @@ TEST_F( ResetOutputList(output); // Rpc in LIMITED level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelLimited, "SendLocation", input_params, output); EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); @@ -420,11 +420,11 @@ TEST_F( ResetOutputList(output); // Rpc in BACKGROUND level - manager_->CheckPermissions(application_id_, - kHmiLevelBackground, - "SendLocation", - input_params, - output); + policy_manager_->CheckPermissions(application_id_, + kHmiLevelBackground, + "SendLocation", + input_params, + output); // Check RPC is allowed EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); @@ -436,7 +436,7 @@ TEST_F( ResetOutputList(output); // Rpc in NONE level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelNone, "SendLocation", input_params, output); EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); @@ -467,7 +467,7 @@ TEST_F(PolicyManagerImplTest2, ::policy::CheckPermissionResult output; // Rpc in FULL level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelFull, "SendLocation", input_params, output); // Check RPC is allowed EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted); @@ -497,7 +497,7 @@ TEST_F(PolicyManagerImplTest2, output.list_of_undefined_params.clear(); // Rpc in LIMITED level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelLimited, "SendLocation", input_params, output); // Check RPC is allowed EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted); @@ -516,11 +516,11 @@ TEST_F(PolicyManagerImplTest2, ResetOutputList(output); // Rpc in BACKGROUND level - manager_->CheckPermissions(application_id_, - kHmiLevelBackground, - "SendLocation", - input_params, - output); + policy_manager_->CheckPermissions(application_id_, + kHmiLevelBackground, + "SendLocation", + input_params, + output); // Check RPC is allowed EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted); @@ -536,7 +536,7 @@ TEST_F(PolicyManagerImplTest2, ResetOutputList(output); // Rpc in NONE level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelNone, "SendLocation", input_params, output); // Check RPC is disallowed EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); @@ -581,7 +581,7 @@ TEST_F(PolicyManagerImplTest2, ::policy::CheckPermissionResult output; // Rpc in FULL level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelFull, "SendLocation", input_params, output); // Check RPC is allowed EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted); @@ -601,7 +601,7 @@ TEST_F(PolicyManagerImplTest2, ResetOutputList(output); // Rpc in LIMITED level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelLimited, "SendLocation", input_params, output); // Check RPC is allowed EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted); @@ -621,11 +621,11 @@ TEST_F(PolicyManagerImplTest2, ResetOutputList(output); // Rpc in BACKGROUND level - manager_->CheckPermissions(application_id_, - kHmiLevelBackground, - "SendLocation", - input_params, - output); + policy_manager_->CheckPermissions(application_id_, + kHmiLevelBackground, + "SendLocation", + input_params, + output); // Check RPC is allowed EXPECT_EQ(::policy::kRpcAllowed, output.hmi_level_permitted); // Check list of allowed parameters is not empty @@ -645,7 +645,7 @@ TEST_F(PolicyManagerImplTest2, ResetOutputList(output); // Rpc in NONE level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelNone, "SendLocation", input_params, output); // Check RPC is disallowed EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); @@ -664,8 +664,8 @@ TEST_F(PolicyManagerImplTest2, // Arrange CreateLocalPT("json/sdl_preloaded_pt_send_location.json"); - manager_->AddDevice(device_id_1_, "Bluetooth"); - policy::CacheManagerInterfaceSPtr cache = manager_->GetCache(); + policy_manager_->AddDevice(device_id_1_, "Bluetooth"); + policy::CacheManagerInterfaceSPtr cache = policy_manager_->GetCache(); ASSERT_TRUE(cache->SetDeviceData(device_id_1_, "hardware IPX", "v.8.0.1", @@ -676,7 +676,7 @@ TEST_F(PolicyManagerImplTest2, "Bluetooth")); // Add app from consented device. App will be assigned with default policies - manager_->AddApplication(application_id_); + policy_manager_->AddApplication(application_id_); std::ifstream ifile("json/sdl_update_pt_2_groups_no_params_in1.json"); Json::Reader reader; @@ -688,7 +688,7 @@ TEST_F(PolicyManagerImplTest2, json = root.toStyledString(); ifile.close(); ::policy::BinaryMessage msg(json.begin(), json.end()); - EXPECT_TRUE(manager_->LoadPT(kFilePtUpdateJson, msg)); + EXPECT_TRUE(policy_manager_->LoadPT(kFilePtUpdateJson, msg)); EXPECT_FALSE(cache->IsPTPreloaded()); // Will be called each time permissions are checked @@ -702,7 +702,7 @@ TEST_F(PolicyManagerImplTest2, ::policy::CheckPermissionResult output; // Rpc in FULL level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelFull, "SendLocation", input_params, output); EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); @@ -711,7 +711,7 @@ TEST_F(PolicyManagerImplTest2, ResetOutputList(output); // Rpc in LIMITED level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelLimited, "SendLocation", input_params, output); EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); @@ -720,11 +720,11 @@ TEST_F(PolicyManagerImplTest2, ResetOutputList(output); // Rpc in BACKGROUND level - manager_->CheckPermissions(application_id_, - kHmiLevelBackground, - "SendLocation", - input_params, - output); + policy_manager_->CheckPermissions(application_id_, + kHmiLevelBackground, + "SendLocation", + input_params, + output); EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); EXPECT_TRUE(output.list_of_allowed_params.empty()); @@ -733,7 +733,7 @@ TEST_F(PolicyManagerImplTest2, ResetOutputList(output); // Rpc in NONE level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelNone, "SendLocation", input_params, output); EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); @@ -750,8 +750,8 @@ TEST_F(PolicyManagerImplTest2, // Arrange CreateLocalPT("json/sdl_preloaded_pt_send_location.json"); - manager_->AddDevice(device_id_1_, "Bluetooth"); - policy::CacheManagerInterfaceSPtr cache = manager_->GetCache(); + policy_manager_->AddDevice(device_id_1_, "Bluetooth"); + policy::CacheManagerInterfaceSPtr cache = policy_manager_->GetCache(); ASSERT_TRUE(cache->SetDeviceData(device_id_1_, "hardware IPX", "v.8.0.1", @@ -762,7 +762,7 @@ TEST_F(PolicyManagerImplTest2, "Bluetooth")); // Add app from consented device. App will be assigned with default policies - manager_->AddApplication(application_id_); + policy_manager_->AddApplication(application_id_); std::ifstream ifile( "json/sdl_update_pt_2_groups_no_params_in1_omitted_in2.json"); @@ -775,7 +775,7 @@ TEST_F(PolicyManagerImplTest2, json = root.toStyledString(); ifile.close(); ::policy::BinaryMessage msg(json.begin(), json.end()); - EXPECT_TRUE(manager_->LoadPT(kFilePtUpdateJson, msg)); + EXPECT_TRUE(policy_manager_->LoadPT(kFilePtUpdateJson, msg)); EXPECT_FALSE(cache->IsPTPreloaded()); // Will be called each time permissions are checked @@ -789,7 +789,7 @@ TEST_F(PolicyManagerImplTest2, ::policy::CheckPermissionResult output; // Rpc in FULL level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelFull, "SendLocation", input_params, output); EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); @@ -798,7 +798,7 @@ TEST_F(PolicyManagerImplTest2, ResetOutputList(output); // Rpc in LIMITED level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelLimited, "SendLocation", input_params, output); EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); EXPECT_TRUE(output.list_of_allowed_params.empty()); @@ -806,11 +806,11 @@ TEST_F(PolicyManagerImplTest2, ResetOutputList(output); // Rpc in BACKGROUND level - manager_->CheckPermissions(application_id_, - kHmiLevelBackground, - "SendLocation", - input_params, - output); + policy_manager_->CheckPermissions(application_id_, + kHmiLevelBackground, + "SendLocation", + input_params, + output); EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); EXPECT_TRUE(output.list_of_allowed_params.empty()); EXPECT_EQ(10u, output.list_of_undefined_params.size()); @@ -818,7 +818,7 @@ TEST_F(PolicyManagerImplTest2, ResetOutputList(output); // Rpc in NONE level - manager_->CheckPermissions( + policy_manager_->CheckPermissions( application_id_, kHmiLevelNone, "SendLocation", input_params, output); EXPECT_EQ(::policy::kRpcDisallowed, output.hmi_level_permitted); EXPECT_TRUE(output.list_of_allowed_params.empty()); @@ -828,8 +828,8 @@ TEST_F(PolicyManagerImplTest2, TEST_F(PolicyManagerImplTest, LoadPT_SetInvalidUpdatePT_PTIsNotLoaded) { // Arrange - manager_->ForcePTExchange(); - manager_->OnUpdateStarted(); + policy_manager_->ForcePTExchange(); + policy_manager_->OnUpdateStarted(); Json::Value table(Json::objectValue); policy_table::Table update(&table); @@ -850,9 +850,9 @@ TEST_F(PolicyManagerImplTest, LoadPT_SetInvalidUpdatePT_PTIsNotLoaded) { EXPECT_CALL(*cache_manager_, SaveUpdateRequired(false)).Times(0); EXPECT_CALL(*cache_manager_, TimeoutResponse()).Times(0); EXPECT_CALL(*cache_manager_, SecondsBetweenRetries(_)).Times(0); - EXPECT_FALSE(manager_->LoadPT(kFilePtUpdateJson, msg)); + EXPECT_FALSE(policy_manager_->LoadPT(kFilePtUpdateJson, msg)); EXPECT_CALL(*cache_manager_, IsPTPreloaded()); - EXPECT_FALSE(manager_->GetCache()->IsPTPreloaded()); + EXPECT_FALSE(policy_manager_->GetCache()->IsPTPreloaded()); } TEST_F( @@ -860,13 +860,13 @@ TEST_F( AddApplication_AddExistingApplicationFromDeviceWithoutConsent_ExpectNoUpdateRequired) { // Arrange CreateLocalPT(preloadet_pt_filename_); - EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus()); + EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus()); GetPTU(kValidSdlPtUpdateJson); - EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus()); + EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus()); // Try to add existing app - manager_->AddApplication(app_id_2_); + policy_manager_->AddApplication(app_id_2_); // Check no update required - EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus()); + EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus()); } uint32_t GetCurrentDaysCount() { @@ -880,19 +880,19 @@ TEST_F(PolicyManagerImplTest2, // Arrange CreateLocalPT(preloadet_pt_filename_); const uint32_t days = GetCurrentDaysCount(); - EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus()); + EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus()); GetPTU(kValidSdlPtUpdateJson); - EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus()); + EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus()); - manager_->AddApplication(app_id_2_); - EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus()); + policy_manager_->AddApplication(app_id_2_); + EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus()); ::policy::Counters counter = ::policy::Counters::DAYS_AFTER_EPOCH; // Set PT was updated 10 days ago (limit is 30 days for now) // So no limit exceeded - manager_->PTUpdatedAt(counter, days - 10); - manager_->OnAppRegisteredOnMobile(app_id_2_); - EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus()); + policy_manager_->PTUpdatedAt(counter, days - 10); + policy_manager_->OnAppRegisteredOnMobile(app_id_2_); + EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus()); } TEST_F(PolicyManagerImplTest2, @@ -900,17 +900,17 @@ TEST_F(PolicyManagerImplTest2, // Arrange CreateLocalPT(preloadet_pt_filename_); const uint32_t days = GetCurrentDaysCount(); - EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus()); + EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus()); GetPTU(kValidSdlPtUpdateJson); - EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus()); + EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus()); - manager_->AddApplication(app_id_2_); - EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus()); + policy_manager_->AddApplication(app_id_2_); + EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus()); ::policy::Counters counter = ::policy::Counters::DAYS_AFTER_EPOCH; // Set PT was updated 50 days ago (limit is 30 days for now) - manager_->PTUpdatedAt(counter, days - 50); - manager_->OnAppRegisteredOnMobile(app_id_2_); - EXPECT_EQ("UPDATE_NEEDED", manager_->GetPolicyTableStatus()); + policy_manager_->PTUpdatedAt(counter, days - 50); + policy_manager_->OnAppRegisteredOnMobile(app_id_2_); + EXPECT_EQ("UPDATE_NEEDED", policy_manager_->GetPolicyTableStatus()); } TEST_F( @@ -919,33 +919,35 @@ TEST_F( // Arrange CreateLocalPT(preloadet_pt_filename_); const uint32_t days = GetCurrentDaysCount(); - EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus()); + EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus()); GetPTU(kValidSdlPtUpdateJson); - EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus()); + EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus()); // Try to add existing app - manager_->AddApplication(app_id_2_); - EXPECT_EQ("UP_TO_DATE", manager_->GetPolicyTableStatus()); + policy_manager_->AddApplication(app_id_2_); + EXPECT_EQ("UP_TO_DATE", policy_manager_->GetPolicyTableStatus()); ::policy::Counters counter = ::policy::Counters::DAYS_AFTER_EPOCH; // Set PT was updated 10 days ago (limit is 30 days for now) // So no limit exceeded - manager_->PTUpdatedAt(counter, days - 10); - int ign_cycles = (manager_->GetCache())->IgnitionCyclesBeforeExchange(); + policy_manager_->PTUpdatedAt(counter, days - 10); + int ign_cycles = + (policy_manager_->GetCache())->IgnitionCyclesBeforeExchange(); // Set ignition cycles to value = 99 (limit is 100 which initiates auto // PTExchange) for (int i = 0; i < ign_cycles; ++i) { - manager_->IncrementIgnitionCycles(); + policy_manager_->IncrementIgnitionCycles(); } - manager_->OnAppRegisteredOnMobile(app_id_2_); + policy_manager_->OnAppRegisteredOnMobile(app_id_2_); // Check update required - EXPECT_EQ("UPDATE_NEEDED", manager_->GetPolicyTableStatus()); + EXPECT_EQ("UPDATE_NEEDED", policy_manager_->GetPolicyTableStatus()); } TEST_F(PolicyManagerImplTest2, GetUserConsentForApp_SetUserConsentForApp_ExpectReceivedConsentCorrect) { // Arrange CreateLocalPT(preloadet_pt_filename_); - ASSERT_TRUE((manager_->GetCache())->AddDevice(device_id_2_, "Bluetooth")); - ASSERT_TRUE((manager_->GetCache()) + ASSERT_TRUE( + (policy_manager_->GetCache())->AddDevice(device_id_2_, "Bluetooth")); + ASSERT_TRUE((policy_manager_->GetCache()) ->SetDeviceData(device_id_2_, "hardware IPX", "v.8.0.1", @@ -959,13 +961,13 @@ TEST_F(PolicyManagerImplTest2, ::policy::StringArray disallowed_groups; consented_groups.push_back(std::string("Notifications")); consented_groups.push_back(std::string("Notifications")); - (manager_->GetCache()) + (policy_manager_->GetCache()) ->SetUserPermissionsForDevice( device_id_2_, consented_groups, disallowed_groups); - manager_->SetUserConsentForDevice(device_id_2_, true); + policy_manager_->SetUserConsentForDevice(device_id_2_, true); EXPECT_CALL(listener_, OnCurrentDeviceIdUpdateRequired(app_id_2_)) .WillRepeatedly(Return(device_id_2_)); - manager_->AddApplication(app_id_2_); + policy_manager_->AddApplication(app_id_2_); GetPTU(kValidSdlPtUpdateJson); ::policy::PermissionConsent perm_consent; @@ -983,11 +985,11 @@ TEST_F(PolicyManagerImplTest2, groups_permissions.push_back(group1_perm); perm_consent.group_permissions = groups_permissions; - manager_->SetUserConsentForApp(perm_consent); - manager_->SendNotificationOnPermissionsUpdated(app_id_2_); + policy_manager_->SetUserConsentForApp(perm_consent); + policy_manager_->SendNotificationOnPermissionsUpdated(app_id_2_); std::vector< ::policy::FunctionalGroupPermission> actual_groups_permissions; std::vector< ::policy::FunctionalGroupPermission>::iterator it; - manager_->GetUserConsentForApp( + policy_manager_->GetUserConsentForApp( device_id_2_, app_id_2_, actual_groups_permissions); uint32_t index = 0; for (; index < actual_groups_permissions.size(); ++index) { @@ -1008,20 +1010,20 @@ TEST_F(PolicyManagerImplTest2, CanAppKeepContext_SetPoliciesForAppUpdated_ExpectAppCanKeepContext) { // Arrange CreateLocalPT(preloadet_pt_filename_); - manager_->AddApplication(app_id_2_); + policy_manager_->AddApplication(app_id_2_); GetPTU(kValidSdlPtUpdateJson); // Check keep context in updated policies for app - EXPECT_TRUE(manager_->CanAppKeepContext(app_id_2_)); + EXPECT_TRUE(policy_manager_->CanAppKeepContext(app_id_2_)); } TEST_F(PolicyManagerImplTest2, CanAppStealFocus_SetPoliciesForAppUpdated_ExpectAppCanStealFocus) { // Arrange CreateLocalPT(preloadet_pt_filename_); - manager_->AddApplication(app_id_2_); + policy_manager_->AddApplication(app_id_2_); GetPTU(kValidSdlPtUpdateJson); // Check keep context in updated policies for app - EXPECT_TRUE(manager_->CanAppKeepContext(app_id_2_)); + EXPECT_TRUE(policy_manager_->CanAppKeepContext(app_id_2_)); } TEST_F(PolicyManagerImplTest2, @@ -1029,9 +1031,10 @@ TEST_F(PolicyManagerImplTest2, // Arrange CreateLocalPT(preloadet_pt_filename_); GetPTU(kValidSdlPtUpdateJson); - utils::SharedPtr<policy_table::Table> pt = (manager_->GetCache())->GetPT(); + utils::SharedPtr<policy_table::Table> pt = + (policy_manager_->GetCache())->GetPT(); policy_table::ModuleConfig& module_config = pt->policy_table.module_config; - ::policy::VehicleInfo vehicle_info = manager_->GetVehicleInfo(); + ::policy::VehicleInfo vehicle_info = policy_manager_->GetVehicleInfo(); EXPECT_EQ(static_cast<std::string>(*module_config.vehicle_make), vehicle_info.vehicle_make); @@ -1047,8 +1050,9 @@ TEST_F( // Arrange CreateLocalPT(preloadet_pt_filename_); - ASSERT_TRUE((manager_->GetCache())->AddDevice(device_id_2_, "Bluetooth")); - ASSERT_TRUE((manager_->GetCache()) + ASSERT_TRUE( + (policy_manager_->GetCache())->AddDevice(device_id_2_, "Bluetooth")); + ASSERT_TRUE((policy_manager_->GetCache()) ->SetDeviceData(device_id_2_, "hardware IPX", "v.8.0.1", @@ -1061,13 +1065,13 @@ TEST_F( ::policy::StringArray consented_groups; ::policy::StringArray disallowed_groups; consented_groups.push_back(std::string("Notifications")); - (manager_->GetCache()) + (policy_manager_->GetCache()) ->SetUserPermissionsForDevice( device_id_2_, consented_groups, disallowed_groups); - manager_->SetUserConsentForDevice(device_id_2_, true); + policy_manager_->SetUserConsentForDevice(device_id_2_, true); EXPECT_CALL(listener_, OnCurrentDeviceIdUpdateRequired(app_id_2_)) .WillRepeatedly(Return(device_id_2_)); - manager_->AddApplication(app_id_2_); + policy_manager_->AddApplication(app_id_2_); GetPTU(kValidSdlPtUpdateJson); ::policy::PermissionConsent perm_consent; @@ -1085,11 +1089,11 @@ TEST_F( groups_permissions.push_back(group1_perm); perm_consent.group_permissions = groups_permissions; - manager_->SetUserConsentForApp(perm_consent); - manager_->SendNotificationOnPermissionsUpdated(app_id_2_); + policy_manager_->SetUserConsentForApp(perm_consent); + policy_manager_->SendNotificationOnPermissionsUpdated(app_id_2_); std::vector< ::policy::FunctionalGroupPermission> actual_groups_permissions; std::vector< ::policy::FunctionalGroupPermission>::iterator it; - manager_->GetPermissionsForApp( + policy_manager_->GetPermissionsForApp( device_id_2_, app_id_2_, actual_groups_permissions); uint32_t index = 0; for (; index < actual_groups_permissions.size(); ++index) { @@ -1112,15 +1116,16 @@ TEST_F( // Arrange CreateLocalPT(preloadet_pt_filename_); - manager_->AddApplication(app_id_3_); - ::policy::StringArray app_requests = manager_->GetAppRequestTypes(app_id_3_); + policy_manager_->AddApplication(app_id_3_); + ::policy::StringArray app_requests = + policy_manager_->GetAppRequestTypes(app_id_3_); EXPECT_EQ(1u, app_requests.size()); Json::Value root = GetPTU(kPtuRequestTypeJson); Json::Value request_Types = Json::Value(Json::arrayValue); request_Types = root["policy_table"]["app_policies"][app_id_3_]["RequestType"]; - app_requests = manager_->GetAppRequestTypes(app_id_3_); + app_requests = policy_manager_->GetAppRequestTypes(app_id_3_); EXPECT_EQ(request_Types.size(), app_requests.size()); // Check nicknames match for (uint32_t i = 0; i < request_Types.size(); ++i) { @@ -1133,7 +1138,8 @@ TEST_F( HertBeatTimeout_AddApp_UpdateAppPolicies_ExpectReceivedHertBeatTimeoutCorrect) { // Arrange CreateLocalPT(preloadet_pt_filename_); - utils::SharedPtr<policy_table::Table> pt = (manager_->GetCache())->GetPT(); + utils::SharedPtr<policy_table::Table> pt = + (policy_manager_->GetCache())->GetPT(); ::policy_table::PolicyTableType type1 = ::policy_table::PolicyTableType::PT_PRELOADED; pt->SetPolicyTableType(type1); @@ -1144,8 +1150,8 @@ TEST_F( pt->ReportErrors(&report); } // Add new app - manager_->AddApplication(app_id_2_); - uint32_t result = manager_->HeartBeatTimeout(app_id_2_); + policy_manager_->AddApplication(app_id_2_); + uint32_t result = policy_manager_->HeartBeatTimeout(app_id_2_); // By default hertbeat timeout is 0 EXPECT_EQ(0u, result); Json::Value root = GetPTU(kValidSdlPtUpdateJson); @@ -1163,7 +1169,7 @@ TEST_F( Json::Value heart_beat_timeout = Json::Value(Json::uintValue); heart_beat_timeout = root["policy_table"]["app_policies"][app_id_2_]["heart_beat_timeout_ms"]; - result = manager_->HeartBeatTimeout(app_id_2_); + result = policy_manager_->HeartBeatTimeout(app_id_2_); EXPECT_EQ(heart_beat_timeout.asUInt(), result); } @@ -1171,8 +1177,9 @@ TEST_F(PolicyManagerImplTest2, RemoveAppConsentForGroup_SetUserConsentForApp_ExpectAppConsentDeleted) { // Arrange CreateLocalPT(preloadet_pt_filename_); - ASSERT_TRUE((manager_->GetCache())->AddDevice(device_id_2_, "Bluetooth")); - ASSERT_TRUE((manager_->GetCache()) + ASSERT_TRUE( + (policy_manager_->GetCache())->AddDevice(device_id_2_, "Bluetooth")); + ASSERT_TRUE((policy_manager_->GetCache()) ->SetDeviceData(device_id_2_, "hardware IPX", "v.8.0.1", @@ -1185,13 +1192,13 @@ TEST_F(PolicyManagerImplTest2, ::policy::StringArray consented_groups; ::policy::StringArray disallowed_groups; consented_groups.push_back(std::string("Notifications")); - (manager_->GetCache()) + (policy_manager_->GetCache()) ->SetUserPermissionsForDevice( device_id_2_, consented_groups, disallowed_groups); - manager_->SetUserConsentForDevice(device_id_2_, true); + policy_manager_->SetUserConsentForDevice(device_id_2_, true); EXPECT_CALL(listener_, OnCurrentDeviceIdUpdateRequired(app_id_2_)) .WillRepeatedly(Return(device_id_2_)); - manager_->AddApplication(app_id_2_); + policy_manager_->AddApplication(app_id_2_); GetPTU(kValidSdlPtUpdateJson); ::policy::PermissionConsent perm_consent; @@ -1209,11 +1216,11 @@ TEST_F(PolicyManagerImplTest2, groups_permissions.push_back(group1_perm); perm_consent.group_permissions = groups_permissions; - manager_->SetUserConsentForApp(perm_consent); - manager_->SendNotificationOnPermissionsUpdated(app_id_2_); + policy_manager_->SetUserConsentForApp(perm_consent); + policy_manager_->SendNotificationOnPermissionsUpdated(app_id_2_); std::vector< ::policy::FunctionalGroupPermission> actual_groups_permissions; std::vector< ::policy::FunctionalGroupPermission>::iterator it; - manager_->GetPermissionsForApp( + policy_manager_->GetPermissionsForApp( device_id_2_, app_id_2_, actual_groups_permissions); uint32_t index = 0; for (; index < actual_groups_permissions.size(); ++index) { @@ -1228,7 +1235,8 @@ TEST_F(PolicyManagerImplTest2, actual_groups_permissions[index].group_name); EXPECT_EQ(group1_perm.group_id, actual_groups_permissions[index].group_id); EXPECT_EQ(group1_perm.state, actual_groups_permissions[index].state); - utils::SharedPtr<policy_table::Table> pt = (manager_->GetCache())->GetPT(); + utils::SharedPtr<policy_table::Table> pt = + (policy_manager_->GetCache())->GetPT(); uint32_t ucr_size = 0; ::policy_table::DeviceData& device_data = *pt->policy_table.device_data; ::policy_table::DeviceData::const_iterator dev_data_iter = @@ -1244,7 +1252,7 @@ TEST_F(PolicyManagerImplTest2, if (ucr_iter != ucr.end()) { EXPECT_TRUE((*(ucr_iter->second.consent_groups)).find("Notifications") != (*(ucr_iter->second.consent_groups)).end()); - manager_->RemoveAppConsentForGroup(app_id_2_, "Notifications"); + policy_manager_->RemoveAppConsentForGroup(app_id_2_, "Notifications"); EXPECT_TRUE((*(ucr_iter->second.consent_groups)).find("Notifications") == (*(ucr_iter->second.consent_groups)).end()); } @@ -1263,10 +1271,10 @@ TEST_F(PolicyManagerImplTest2, // permissions, request type etc. EXPECT_CALL(listener_, OnCurrentDeviceIdUpdateRequired(app_id_2_)) .WillRepeatedly(Return(device_id_1_)); - manager_->SetUserConsentForDevice(device_id_1_, true); + policy_manager_->SetUserConsentForDevice(device_id_1_, true); // Add app - manager_->AddApplication(section_name); + policy_manager_->AddApplication(section_name); EXPECT_CALL(listener_, OnPendingPermissionChange(section_name)).Times(2); // PTU has single invalid RequestTypes, which must be dropped and replaced @@ -1275,18 +1283,18 @@ TEST_F(PolicyManagerImplTest2, // Get RequestTypes from <app_id> section of app policies after PT update ::policy::StringArray app_request_types_after = - manager_->GetAppRequestTypes(section_name); + policy_manager_->GetAppRequestTypes(section_name); EXPECT_CALL(listener_, OnCurrentDeviceIdUpdateRequired(kDefaultId)) .WillOnce(Return(device_id_1_)); ::policy::StringArray default_request_types_after = - manager_->GetAppRequestTypes(kDefaultId); + policy_manager_->GetAppRequestTypes(kDefaultId); // Check sizes of Request types of PT and PTU EXPECT_EQ(4u, app_request_types_after.size()); ::policy::AppPermissions permissions = - manager_->GetAppPermissionsChanges(section_name); + policy_manager_->GetAppPermissionsChanges(section_name); EXPECT_TRUE(permissions.requestTypeChanged); policy_table::RequestType temp_res1; |