1 /*
2  * Copyright (C) 2018 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 package com.android.settings.security;
18 
19 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_ALPHABETIC;
20 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_SOMETHING;
21 import static android.app.admin.DevicePolicyManager.PASSWORD_QUALITY_UNSPECIFIED;
22 
23 import static com.android.settings.core.BasePreferenceController.AVAILABLE;
24 import static com.android.settings.core.BasePreferenceController.DISABLED_FOR_USER;
25 
26 import static com.google.common.truth.Truth.assertThat;
27 
28 import static org.mockito.ArgumentMatchers.anyInt;
29 import static org.mockito.Mockito.spy;
30 import static org.mockito.Mockito.when;
31 
32 import android.content.Context;
33 import android.content.pm.PackageManager;
34 import android.hardware.fingerprint.FingerprintManager;
35 import android.os.UserManager;
36 
37 import androidx.lifecycle.LifecycleOwner;
38 
39 import com.android.internal.widget.LockPatternUtils;
40 import com.android.settings.testutils.FakeFeatureFactory;
41 import com.android.settingslib.core.lifecycle.Lifecycle;
42 
43 import org.junit.Before;
44 import org.junit.Test;
45 import org.junit.runner.RunWith;
46 import org.mockito.Mock;
47 import org.mockito.MockitoAnnotations;
48 import org.robolectric.RobolectricTestRunner;
49 import org.robolectric.RuntimeEnvironment;
50 import org.robolectric.shadows.ShadowApplication;
51 
52 @RunWith(RobolectricTestRunner.class)
53 public class VisiblePatternProfilePreferenceControllerTest {
54 
55     private static final int FAKE_PROFILE_USER_ID = 1234;
56 
57     @Mock
58     private PackageManager mPackageManager;
59     @Mock
60     private LockPatternUtils mLockPatternUtils;
61     @Mock
62     private FingerprintManager mFingerprintManager;
63     @Mock
64     private UserManager mUm;
65 
66     private Lifecycle mLifecycle;
67     private LifecycleOwner mLifecycleOwner;
68     private FakeFeatureFactory mFeatureFactory;
69     private Context mContext;
70     private VisiblePatternProfilePreferenceController mController;
71 
72     @Before
setUp()73     public void setUp() {
74         MockitoAnnotations.initMocks(this);
75         mContext = spy(RuntimeEnvironment.application);
76         when(mContext.getPackageManager()).thenReturn(mPackageManager);
77         when(mPackageManager.hasSystemFeature(PackageManager.FEATURE_FINGERPRINT)).thenReturn(true);
78         final ShadowApplication application = ShadowApplication.getInstance();
79         application.setSystemService(Context.FINGERPRINT_SERVICE, mFingerprintManager);
80         application.setSystemService(Context.USER_SERVICE, mUm);
81 
82         mFeatureFactory = FakeFeatureFactory.setupForTest();
83         when(mFeatureFactory.securityFeatureProvider.getLockPatternUtils(mContext))
84                 .thenReturn(mLockPatternUtils);
85         when(mUm.getProfileIdsWithDisabled(anyInt())).thenReturn(new int[] {FAKE_PROFILE_USER_ID});
86 
87         mLifecycleOwner = () -> mLifecycle;
88         mLifecycle = new Lifecycle(mLifecycleOwner);
89         mController = new VisiblePatternProfilePreferenceController(mContext, mLifecycle);
90     }
91 
92     @Test
getAvailabilityStatus_notSecure_DISABLED()93     public void getAvailabilityStatus_notSecure_DISABLED() {
94         when(mLockPatternUtils.isSecure(FAKE_PROFILE_USER_ID)).thenReturn(false);
95         when(mLockPatternUtils.getKeyguardStoredPasswordQuality(FAKE_PROFILE_USER_ID))
96                 .thenReturn(PASSWORD_QUALITY_UNSPECIFIED);
97 
98         assertThat(mController.getAvailabilityStatus()).isEqualTo(DISABLED_FOR_USER);
99     }
100 
101     @Test
getAvailabilityStatus_secureWithPassword_DISABLED()102     public void getAvailabilityStatus_secureWithPassword_DISABLED() {
103         when(mLockPatternUtils.isSecure(FAKE_PROFILE_USER_ID)).thenReturn(true);
104         when(mLockPatternUtils.getKeyguardStoredPasswordQuality(FAKE_PROFILE_USER_ID))
105                 .thenReturn(PASSWORD_QUALITY_ALPHABETIC);
106 
107         assertThat(mController.getAvailabilityStatus()).isEqualTo(DISABLED_FOR_USER);
108     }
109 
110     @Test
getAvailabilityStatus_secureWithPattern_AVAILABLE()111     public void getAvailabilityStatus_secureWithPattern_AVAILABLE() {
112         when(mLockPatternUtils.isSecure(FAKE_PROFILE_USER_ID)).thenReturn(true);
113         when(mLockPatternUtils.getKeyguardStoredPasswordQuality(FAKE_PROFILE_USER_ID))
114                 .thenReturn(PASSWORD_QUALITY_SOMETHING);
115 
116         assertThat(mController.getAvailabilityStatus()).isEqualTo(AVAILABLE);
117     }
118 }
119