1 /* 2 * Copyright (C) 2018 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 package com.android.settings.security; 18 19 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_ALPHABETIC; 20 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_SOMETHING; 21 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED; 22 import static com.android.settings.core.BasePreferenceController.AVAILABLE; 23 import static com.android.settings.core.BasePreferenceController.DISABLED_FOR_USER; 24 import static com.google.common.truth.Truth.assertThat; 25 import static org.mockito.ArgumentMatchers.anyInt; 26 import static org.mockito.Mockito.spy; 27 import static org.mockito.Mockito.when; 28 29 import android.arch.lifecycle.LifecycleOwner; 30 import android.content.Context; 31 import android.content.pm.PackageManager; 32 import android.hardware.fingerprint.FingerprintManager; 33 import android.os.UserManager; 34 35 import com.android.internal.widget.LockPatternUtils; 36 import com.android.settings.testutils.FakeFeatureFactory; 37 import com.android.settings.testutils.SettingsRobolectricTestRunner; 38 import com.android.settingslib.core.lifecycle.Lifecycle; 39 40 import org.junit.Before; 41 import org.junit.Test; 42 import org.junit.runner.RunWith; 43 import org.mockito.Mock; 44 import org.mockito.MockitoAnnotations; 45 import org.robolectric.RuntimeEnvironment; 46 import org.robolectric.shadows.ShadowApplication; 47 48 @RunWith(SettingsRobolectricTestRunner.class) 49 public class VisiblePatternProfilePreferenceControllerTest { 50 51 private static final int FAKE_PROFILE_USER_ID = 1234; 52 53 @Mock 54 private PackageManager mPackageManager; 55 @Mock 56 private LockPatternUtils mLockPatternUtils; 57 @Mock 58 private FingerprintManager mFingerprintManager; 59 @Mock 60 private UserManager mUm; 61 62 private Lifecycle mLifecycle; 63 private LifecycleOwner mLifecycleOwner; 64 private FakeFeatureFactory mFeatureFactory; 65 private Context mContext; 66 private VisiblePatternProfilePreferenceController mController; 67 68 @Before setUp()69 public void setUp() { 70 MockitoAnnotations.initMocks(this); 71 mContext = spy(RuntimeEnvironment.application); 72 when(mContext.getPackageManager()).thenReturn(mPackageManager); 73 when(mPackageManager.hasSystemFeature(PackageManager.FEATURE_FINGERPRINT)).thenReturn(true); 74 final ShadowApplication application = ShadowApplication.getInstance(); 75 application.setSystemService(Context.FINGERPRINT_SERVICE, mFingerprintManager); 76 application.setSystemService(Context.USER_SERVICE, mUm); 77 78 mFeatureFactory = FakeFeatureFactory.setupForTest(); 79 when(mFeatureFactory.securityFeatureProvider.getLockPatternUtils(mContext)) 80 .thenReturn(mLockPatternUtils); 81 when(mUm.getProfileIdsWithDisabled(anyInt())).thenReturn(new int[] {FAKE_PROFILE_USER_ID}); 82 83 mLifecycleOwner = () -> mLifecycle; 84 mLifecycle = new Lifecycle(mLifecycleOwner); 85 mController = new VisiblePatternProfilePreferenceController(mContext, mLifecycle); 86 } 87 88 @Test getAvailabilityStatus_notSecure_DISABLED()89 public void getAvailabilityStatus_notSecure_DISABLED() { 90 when(mLockPatternUtils.isSecure(FAKE_PROFILE_USER_ID)).thenReturn(false); 91 when(mLockPatternUtils.getKeyguardStoredPasswordQuality(FAKE_PROFILE_USER_ID)) 92 .thenReturn(PASSWORD_QUALITY_UNSPECIFIED); 93 94 assertThat(mController.getAvailabilityStatus()).isEqualTo(DISABLED_FOR_USER); 95 } 96 97 @Test getAvailabilityStatus_secureWithPassword_DISABLED()98 public void getAvailabilityStatus_secureWithPassword_DISABLED() { 99 when(mLockPatternUtils.isSecure(FAKE_PROFILE_USER_ID)).thenReturn(true); 100 when(mLockPatternUtils.getKeyguardStoredPasswordQuality(FAKE_PROFILE_USER_ID)) 101 .thenReturn(PASSWORD_QUALITY_ALPHABETIC); 102 103 assertThat(mController.getAvailabilityStatus()).isEqualTo(DISABLED_FOR_USER); 104 } 105 106 @Test getAvailabilityStatus_secureWithPattern_AVAILABLE()107 public void getAvailabilityStatus_secureWithPattern_AVAILABLE() { 108 when(mLockPatternUtils.isSecure(FAKE_PROFILE_USER_ID)).thenReturn(true); 109 when(mLockPatternUtils.getKeyguardStoredPasswordQuality(FAKE_PROFILE_USER_ID)) 110 .thenReturn(PASSWORD_QUALITY_SOMETHING); 111 112 assertThat(mController.getAvailabilityStatus()).isEqualTo(AVAILABLE); 113 } 114 } 115