2019-01-29 21:36:13 +01:00
|
|
|
#!/usr/bin/python3
|
|
|
|
|
|
|
|
import unittest
|
|
|
|
import sys
|
|
|
|
|
|
|
|
sys.path.append('../util')
|
|
|
|
import iwd
|
|
|
|
from iwd import IWD
|
|
|
|
from iwd import PSKAgent
|
|
|
|
from iwd import NetworkType
|
|
|
|
|
|
|
|
from hostapd import HostapdCLI
|
|
|
|
from hwsim import Hwsim
|
|
|
|
|
|
|
|
import time
|
|
|
|
|
|
|
|
class Test(unittest.TestCase):
|
|
|
|
|
|
|
|
def test_connection_success(self):
|
|
|
|
hwsim = Hwsim()
|
|
|
|
|
2019-06-11 18:25:54 +02:00
|
|
|
bss_hostapd = [ HostapdCLI(config='ssid1.conf'),
|
|
|
|
HostapdCLI(config='ssid2.conf'),
|
|
|
|
HostapdCLI(config='ssid3.conf') ]
|
|
|
|
bss_radio = [ hwsim.get_radio('rad0'),
|
|
|
|
hwsim.get_radio('rad1'),
|
|
|
|
hwsim.get_radio('rad2') ]
|
2019-01-29 21:36:13 +01:00
|
|
|
|
|
|
|
rule0 = hwsim.rules.create()
|
|
|
|
rule0.source = bss_radio[0].addresses[0]
|
|
|
|
rule0.bidirectional = True
|
|
|
|
rule0.signal = -2000
|
|
|
|
|
|
|
|
rule1 = hwsim.rules.create()
|
|
|
|
rule1.source = bss_radio[1].addresses[0]
|
|
|
|
rule1.bidirectional = True
|
2020-05-05 18:03:18 +02:00
|
|
|
rule1.signal = -3000
|
2019-01-29 21:36:13 +01:00
|
|
|
|
2019-03-01 19:55:05 +01:00
|
|
|
rule2 = hwsim.rules.create()
|
|
|
|
rule2.source = bss_radio[2].addresses[0]
|
|
|
|
rule2.bidirectional = True
|
2020-05-05 18:03:18 +02:00
|
|
|
rule2.signal = -4000
|
2019-03-01 19:55:05 +01:00
|
|
|
|
2020-09-11 01:12:41 +02:00
|
|
|
wd = IWD(True)
|
2019-01-29 21:36:13 +01:00
|
|
|
|
|
|
|
psk_agent = PSKAgent("secret123")
|
|
|
|
wd.register_psk_agent(psk_agent)
|
|
|
|
|
2020-07-08 19:48:00 +02:00
|
|
|
devices = wd.list_devices(2)
|
2019-01-29 21:36:13 +01:00
|
|
|
device = devices[0]
|
|
|
|
|
2020-07-08 19:48:00 +02:00
|
|
|
devices[1].disconnect()
|
|
|
|
|
2019-01-29 21:36:13 +01:00
|
|
|
condition = 'not obj.scanning'
|
|
|
|
wd.wait_for_object_condition(device, condition)
|
|
|
|
|
|
|
|
device.scan()
|
|
|
|
|
|
|
|
condition = 'not obj.scanning'
|
|
|
|
wd.wait_for_object_condition(device, condition)
|
|
|
|
|
|
|
|
ordered_network = device.get_ordered_network("TestBlacklist")
|
|
|
|
|
|
|
|
self.assertEqual(ordered_network.type, NetworkType.psk)
|
|
|
|
|
|
|
|
condition = 'not obj.connected'
|
|
|
|
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
|
|
|
|
2020-09-11 01:12:41 +02:00
|
|
|
rule0.drop = True
|
|
|
|
|
2019-01-29 21:36:13 +01:00
|
|
|
ordered_network.network_object.connect(wait=False)
|
|
|
|
|
|
|
|
# Have AP1 drop all packets, should result in a connection timeout
|
|
|
|
rule0.drop = True
|
|
|
|
|
|
|
|
# Note the time so later we don't sleep any longer than required
|
|
|
|
start = time.time()
|
|
|
|
|
|
|
|
condition = 'obj.state == DeviceState.connected'
|
|
|
|
wd.wait_for_object_condition(device, condition)
|
|
|
|
|
|
|
|
# IWD should have attempted to connect to bss_hostapd[0], since its
|
|
|
|
# signal strength was highest. But since we dropped all packets this
|
|
|
|
# connect should fail, and the BSS should be blacklisted. Then we
|
|
|
|
# should automatically try the next BSS in the list, which is
|
|
|
|
# bss_hostapd[1]
|
|
|
|
self.assertNotIn(device.address, bss_hostapd[0].list_sta())
|
|
|
|
self.assertIn(device.address, bss_hostapd[1].list_sta())
|
|
|
|
|
|
|
|
rule0.drop = False
|
|
|
|
|
|
|
|
# Next try autoconnecting to a network with a blacklisted BSS. Since an
|
|
|
|
# explicit disconnect call would disable autoconnect we reset
|
|
|
|
# hostapd which will disconnect IWD.
|
|
|
|
bss_hostapd[1].reload()
|
|
|
|
|
|
|
|
condition = 'not obj.connected'
|
|
|
|
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
|
|
|
|
2019-10-24 19:53:23 +02:00
|
|
|
# Now we wait... AutoConnect should take over
|
2019-01-29 21:36:13 +01:00
|
|
|
|
|
|
|
condition = 'obj.state == DeviceState.connecting'
|
2020-09-11 01:12:37 +02:00
|
|
|
wd.wait_for_object_condition(device, condition)
|
2019-01-29 21:36:13 +01:00
|
|
|
|
|
|
|
condition = 'obj.state == DeviceState.connected'
|
2020-09-11 01:12:37 +02:00
|
|
|
wd.wait_for_object_condition(device, condition)
|
2019-01-29 21:36:13 +01:00
|
|
|
|
|
|
|
# Same as before, make sure we didn't connect to the blacklisted AP.
|
|
|
|
self.assertNotIn(device.address, bss_hostapd[0].list_sta())
|
|
|
|
self.assertIn(device.address, bss_hostapd[1].list_sta())
|
|
|
|
|
|
|
|
# Wait for the blacklist to expire (10 seconds)
|
|
|
|
elapsed = time.time() - start
|
|
|
|
|
2020-07-08 19:48:00 +02:00
|
|
|
if elapsed < 15:
|
|
|
|
wd.wait(15 - elapsed)
|
2019-01-29 21:36:13 +01:00
|
|
|
|
|
|
|
device.disconnect()
|
|
|
|
|
|
|
|
condition = 'not obj.scanning'
|
|
|
|
wd.wait_for_object_condition(device, condition)
|
|
|
|
|
|
|
|
device.scan()
|
|
|
|
|
|
|
|
condition = 'not obj.scanning'
|
|
|
|
wd.wait_for_object_condition(device, condition)
|
|
|
|
|
|
|
|
ordered_network = device.get_ordered_network("TestBlacklist")
|
|
|
|
|
|
|
|
self.assertEqual(ordered_network.type, NetworkType.psk)
|
|
|
|
|
|
|
|
condition = 'not obj.connected'
|
|
|
|
wd.wait_for_object_condition(ordered_network.network_object, condition)
|
|
|
|
|
|
|
|
ordered_network.network_object.connect()
|
|
|
|
|
2020-09-14 23:02:33 +02:00
|
|
|
condition = 'obj.state == DeviceState.connected'
|
|
|
|
wd.wait_for_object_condition(device, condition)
|
2019-01-29 21:36:13 +01:00
|
|
|
|
|
|
|
self.assertIn(device.address, bss_hostapd[0].list_sta())
|
|
|
|
|
|
|
|
wd.unregister_psk_agent(psk_agent)
|
|
|
|
|
2020-09-11 01:12:41 +02:00
|
|
|
rule0.remove()
|
|
|
|
rule1.remove()
|
|
|
|
rule2.remove()
|
|
|
|
|
2019-01-29 21:36:13 +01:00
|
|
|
@classmethod
|
|
|
|
def setUpClass(cls):
|
|
|
|
IWD.copy_to_storage('main.conf')
|
|
|
|
|
|
|
|
@classmethod
|
|
|
|
def tearDownClass(cls):
|
|
|
|
IWD.clear_storage()
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
unittest.main(exit=True)
|