2019-01-29 21:36:13 +01:00
|
|
|
#!/usr/bin/python3
|
|
|
|
|
|
|
|
import unittest
|
|
|
|
import sys
|
|
|
|
|
|
|
|
sys.path.append('../util')
|
|
|
|
import iwd
|
|
|
|
from iwd import IWD
|
|
|
|
from iwd import PSKAgent
|
|
|
|
from iwd import NetworkType
|
|
|
|
|
|
|
|
from hostapd import HostapdCLI
|
|
|
|
from hwsim import Hwsim
|
|
|
|
|
|
|
|
class Test(unittest.TestCase):
|
|
|
|
|
|
|
|
def test_connection_success(self):
|
|
|
|
hwsim = Hwsim()
|
|
|
|
|
2019-06-11 18:25:54 +02:00
|
|
|
bss_hostapd = [ HostapdCLI(config='ssid1.conf'),
|
|
|
|
HostapdCLI(config='ssid2.conf'),
|
|
|
|
HostapdCLI(config='ssid3.conf') ]
|
|
|
|
bss_radio = [ hwsim.get_radio('rad0'),
|
|
|
|
hwsim.get_radio('rad1'),
|
|
|
|
hwsim.get_radio('rad2') ]
|
2019-01-29 21:36:13 +01:00
|
|
|
|
|
|
|
rule0 = hwsim.rules.create()
|
|
|
|
rule0.source = bss_radio[0].addresses[0]
|
|
|
|
rule0.bidirectional = True
|
|
|
|
rule0.signal = -2000
|
|
|
|
|
|
|
|
rule1 = hwsim.rules.create()
|
|
|
|
rule1.source = bss_radio[1].addresses[0]
|
|
|
|
rule1.bidirectional = True
|
2020-05-05 18:03:18 +02:00
|
|
|
rule1.signal = -3000
|
2019-01-29 21:36:13 +01:00
|
|
|
|
2019-03-01 19:55:05 +01:00
|
|
|
rule2 = hwsim.rules.create()
|
|
|
|
rule2.source = bss_radio[2].addresses[0]
|
|
|
|
rule2.bidirectional = True
|
2020-05-05 18:03:18 +02:00
|
|
|
rule2.signal = -4000
|
2019-03-01 19:55:05 +01:00
|
|
|
|
2020-09-11 01:12:41 +02:00
|
|
|
wd = IWD(True)
|
2019-01-29 21:36:13 +01:00
|
|
|
|
|
|
|
psk_agent = PSKAgent("wrong_password")
|
|
|
|
wd.register_psk_agent(psk_agent)
|
|
|
|
|
|
|
|
devices = wd.list_devices(1)
|
|
|
|
device = devices[0]
|
|
|
|
|
2021-02-12 00:16:14 +01:00
|
|
|
ordered_network = device.get_ordered_network("TestBlacklist", scan_if_needed=True)
|
2019-01-29 21:36:13 +01:00
|
|
|
|
|
|
|
self.assertEqual(ordered_network.type, NetworkType.psk)
|
|
|
|
|
|
|
|
condition = 'not obj.connected'
|
|
|
|
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
|
|
|
|
|
|
|
with self.assertRaises(iwd.FailedEx):
|
|
|
|
ordered_network.network_object.connect()
|
|
|
|
|
|
|
|
wd.unregister_psk_agent(psk_agent)
|
|
|
|
|
|
|
|
psk_agent = PSKAgent("secret123")
|
|
|
|
wd.register_psk_agent(psk_agent)
|
|
|
|
|
|
|
|
ordered_network.network_object.connect()
|
|
|
|
|
|
|
|
# We failed to connect bss_hostapd[0], but with a bad password. Verify
|
|
|
|
# that this did not trigger a blacklist and that we did reconnect
|
|
|
|
# successfully to bss_hostapd[0]
|
|
|
|
self.assertIn(device.address, bss_hostapd[0].list_sta())
|
|
|
|
|
2020-09-14 23:02:33 +02:00
|
|
|
condition = 'obj.state == DeviceState.connected'
|
|
|
|
wd.wait_for_object_condition(device, condition)
|
2019-01-29 21:36:13 +01:00
|
|
|
|
2020-09-11 01:12:41 +02:00
|
|
|
wd.unregister_psk_agent(psk_agent)
|
|
|
|
|
|
|
|
rule0.remove()
|
|
|
|
rule1.remove()
|
|
|
|
rule2.remove()
|
|
|
|
|
2019-01-29 21:36:13 +01:00
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
pass
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
IWD.clear_storage()
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
unittest.main(exit=True)
|