1 /* 2 * Copyright (C) 2018 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 package com.android.settings.security; 18 19 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_ALPHABETIC; 20 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_SOMETHING; 21 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED; 22 23 import static com.android.settings.core.BasePreferenceController.AVAILABLE; 24 import static com.android.settings.core.BasePreferenceController.DISABLED_FOR_USER; 25 26 import static com.google.common.truth.Truth.assertThat; 27 28 import static org.mockito.ArgumentMatchers.anyInt; 29 import static org.mockito.Mockito.spy; 30 import static org.mockito.Mockito.when; 31 32 import android.content.Context; 33 import android.content.pm.PackageManager; 34 import android.hardware.fingerprint.FingerprintManager; 35 import android.os.UserManager; 36 37 import androidx.lifecycle.LifecycleOwner; 38 39 import com.android.internal.widget.LockPatternUtils; 40 import com.android.settings.testutils.FakeFeatureFactory; 41 import com.android.settingslib.core.lifecycle.Lifecycle; 42 43 import org.junit.Before; 44 import org.junit.Test; 45 import org.junit.runner.RunWith; 46 import org.mockito.Mock; 47 import org.mockito.MockitoAnnotations; 48 import org.robolectric.RobolectricTestRunner; 49 import org.robolectric.RuntimeEnvironment; 50 import org.robolectric.shadows.ShadowApplication; 51 52 @RunWith(RobolectricTestRunner.class) 53 public class VisiblePatternProfilePreferenceControllerTest { 54 55 private static final int FAKE_PROFILE_USER_ID = 1234; 56 57 @Mock 58 private PackageManager mPackageManager; 59 @Mock 60 private LockPatternUtils mLockPatternUtils; 61 @Mock 62 private FingerprintManager mFingerprintManager; 63 @Mock 64 private UserManager mUm; 65 66 private Lifecycle mLifecycle; 67 private LifecycleOwner mLifecycleOwner; 68 private FakeFeatureFactory mFeatureFactory; 69 private Context mContext; 70 private VisiblePatternProfilePreferenceController mController; 71 72 @Before setUp()73 public void setUp() { 74 MockitoAnnotations.initMocks(this); 75 mContext = spy(RuntimeEnvironment.application); 76 when(mContext.getPackageManager()).thenReturn(mPackageManager); 77 when(mPackageManager.hasSystemFeature(PackageManager.FEATURE_FINGERPRINT)).thenReturn(true); 78 final ShadowApplication application = ShadowApplication.getInstance(); 79 application.setSystemService(Context.FINGERPRINT_SERVICE, mFingerprintManager); 80 application.setSystemService(Context.USER_SERVICE, mUm); 81 82 mFeatureFactory = FakeFeatureFactory.setupForTest(); 83 when(mFeatureFactory.securityFeatureProvider.getLockPatternUtils(mContext)) 84 .thenReturn(mLockPatternUtils); 85 when(mUm.getProfileIdsWithDisabled(anyInt())).thenReturn(new int[] {FAKE_PROFILE_USER_ID}); 86 87 mLifecycleOwner = () -> mLifecycle; 88 mLifecycle = new Lifecycle(mLifecycleOwner); 89 mController = new VisiblePatternProfilePreferenceController(mContext, mLifecycle); 90 } 91 92 @Test getAvailabilityStatus_notSecure_DISABLED()93 public void getAvailabilityStatus_notSecure_DISABLED() { 94 when(mLockPatternUtils.isSecure(FAKE_PROFILE_USER_ID)).thenReturn(false); 95 when(mLockPatternUtils.getKeyguardStoredPasswordQuality(FAKE_PROFILE_USER_ID)) 96 .thenReturn(PASSWORD_QUALITY_UNSPECIFIED); 97 98 assertThat(mController.getAvailabilityStatus()).isEqualTo(DISABLED_FOR_USER); 99 } 100 101 @Test getAvailabilityStatus_secureWithPassword_DISABLED()102 public void getAvailabilityStatus_secureWithPassword_DISABLED() { 103 when(mLockPatternUtils.isSecure(FAKE_PROFILE_USER_ID)).thenReturn(true); 104 when(mLockPatternUtils.getKeyguardStoredPasswordQuality(FAKE_PROFILE_USER_ID)) 105 .thenReturn(PASSWORD_QUALITY_ALPHABETIC); 106 107 assertThat(mController.getAvailabilityStatus()).isEqualTo(DISABLED_FOR_USER); 108 } 109 110 @Test getAvailabilityStatus_secureWithPattern_AVAILABLE()111 public void getAvailabilityStatus_secureWithPattern_AVAILABLE() { 112 when(mLockPatternUtils.isSecure(FAKE_PROFILE_USER_ID)).thenReturn(true); 113 when(mLockPatternUtils.getKeyguardStoredPasswordQuality(FAKE_PROFILE_USER_ID)) 114 .thenReturn(PASSWORD_QUALITY_SOMETHING); 115 116 assertThat(mController.getAvailabilityStatus()).isEqualTo(AVAILABLE); 117 } 118 119 @Test getPreferenceKey_byDefault_returnsDefaultValue()120 public void getPreferenceKey_byDefault_returnsDefaultValue() { 121 assertThat(mController.getPreferenceKey()).isEqualTo("visiblepattern_profile"); 122 } 123 124 @Test getPreferenceKey_whenGivenValue_returnsGivenValue()125 public void getPreferenceKey_whenGivenValue_returnsGivenValue() { 126 mController = new VisiblePatternProfilePreferenceController(mContext, mLifecycle, "key"); 127 128 assertThat(mController.getPreferenceKey()).isEqualTo("key"); 129 } 130 } 131