blob: 1f24275bef34533f9d3c4ab3b5546598488dff37 [file] [log] [blame]
// Copyright 2020 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
#include "presence/presence_service.h"
#include <memory>
#include <string>
#include <utility>
#include <vector>
#include "gmock/gmock.h"
#include "protobuf-matchers/protocol-buffer-matchers.h"
#include "gtest/gtest.h"
#include "absl/strings/string_view.h"
#include "internal/platform/count_down_latch.h"
#include "internal/platform/medium_environment.h"
#include "presence/presence_client.h"
#include "presence/presence_service_impl.h"
namespace nearby {
namespace presence {
namespace {
using DeviceIdentityMetaData = ::nearby::internal::DeviceIdentityMetaData;
constexpr absl::string_view kManagerAppId = "TEST_MANAGER_APP";
constexpr absl::string_view kAccountName = "dummy account";
class PresenceServiceTest : public testing::Test {
protected:
nearby::MediumEnvironment& env_{nearby::MediumEnvironment::Instance()};
};
DeviceIdentityMetaData CreateTestDeviceIdentityMetaData() {
DeviceIdentityMetaData device_identity_metadata;
device_identity_metadata.set_device_type(
internal::DeviceType::DEVICE_TYPE_PHONE);
device_identity_metadata.set_device_name("NP test device");
device_identity_metadata.set_bluetooth_mac_address(
"\xFF\xFF\xFF\xFF\xFF\xFF");
device_identity_metadata.set_device_id("\x12\xab\xcd");
return device_identity_metadata;
}
CredentialSelector BuildDefaultCredentialSelector() {
CredentialSelector credential_selector;
credential_selector.manager_app_id = std::string(kManagerAppId);
credential_selector.account_name = std::string(kAccountName);
credential_selector.identity_type = internal::IDENTITY_TYPE_PRIVATE_GROUP;
return credential_selector;
}
TEST_F(PresenceServiceTest, DefaultConstructorWorks) {
PresenceServiceImpl presence_service;
}
TEST_F(PresenceServiceTest, StartThenStopScan) {
env_.Start();
absl::Status scan_result;
ScanCallback scan_callback = {
.start_scan_cb = [&](absl::Status status) { scan_result = status; },
};
PresenceServiceImpl presence_service;
std::unique_ptr<PresenceClient> client =
presence_service.CreatePresenceClient();
absl::StatusOr<ScanSessionId> scan_session = client->StartScan(
{},
{
.start_scan_cb = [&](absl::Status status) { scan_result = status; },
});
absl::StatusOr<ScanSessionId> scan_session_with_default_params =
client->StartScan(ScanRequest(), ScanCallback());
ASSERT_OK(scan_session);
ASSERT_OK(scan_session_with_default_params);
EXPECT_NE(*scan_session, *scan_session_with_default_params);
client->StopScan(*scan_session);
client->StopScan(*scan_session_with_default_params);
env_.Stop();
}
TEST_F(PresenceServiceTest, UpdatingDeviceIdentityMetaDataWorks) {
PresenceServiceImpl presence_service;
presence_service.UpdateDeviceIdentityMetaData(
CreateTestDeviceIdentityMetaData(), false, "Test app", {}, 3, 1, {});
EXPECT_EQ(presence_service.GetDeviceIdentityMetaData().SerializeAsString(),
CreateTestDeviceIdentityMetaData().SerializeAsString());
}
TEST_F(PresenceServiceTest, TestGetDeviceProvider) {
PresenceServiceImpl presence_service;
EXPECT_NE(presence_service.GetLocalDeviceProvider(), nullptr);
}
TEST_F(PresenceServiceTest, TestGetPublicCredentials) {
PresenceServiceImpl presence_service;
CredentialSelector selector = BuildDefaultCredentialSelector();
absl::Status status;
nearby::CountDownLatch fetched_latch(1);
presence_service.GetLocalPublicCredentials(
selector,
{.credentials_fetched_cb =
[&status, &fetched_latch](
absl::StatusOr<std::vector<nearby::internal::SharedCredential>>
result) {
status = result.status();
fetched_latch.CountDown();
}});
EXPECT_TRUE(fetched_latch.Await().Ok());
EXPECT_THAT(status, testing::status::StatusIs(absl::StatusCode::kNotFound));
}
TEST_F(PresenceServiceTest, TestUpdateRemotePublicCredentials) {
PresenceServiceImpl presence_service;
internal::SharedCredential public_credential_for_test;
public_credential_for_test.set_identity_type(
internal::IdentityType::IDENTITY_TYPE_CONTACTS_GROUP);
std::vector<internal::SharedCredential> public_credentials{
{public_credential_for_test}};
nearby::CountDownLatch updated_latch(1);
UpdateRemotePublicCredentialsCallback update_credentials_cb{
.credentials_updated_cb =
[&updated_latch](absl::Status status) {
if (status.ok()) {
updated_latch.CountDown();
}
},
};
presence_service.UpdateRemotePublicCredentials(
kManagerAppId, kAccountName, public_credentials,
std::move(update_credentials_cb));
EXPECT_TRUE(updated_latch.Await().Ok());
}
} // namespace
} // namespace presence
} // namespace nearby