1use crate::test_utils::RetryWithBackoff;
6use fidl::endpoints::{create_endpoints, create_proxy};
7use fidl_fuchsia_wlan_policy as fidl_policy;
8use fidl_fuchsia_wlan_policy::{Credential, NetworkConfig, NetworkIdentifier, SecurityType};
9use fuchsia_component::client::connect_to_protocol_at;
10use futures::{StreamExt, TryStreamExt};
11use ieee80211::Ssid;
12use log::info;
13
14fn create_network_config(
15 ssid: &Ssid,
16 security_type: SecurityType,
17 credential: Credential,
18) -> NetworkConfig {
19 let network_id = NetworkIdentifier { ssid: ssid.to_vec(), type_: security_type };
20 NetworkConfig { id: Some(network_id), credential: Some(credential), ..Default::default() }
21}
22
23fn credential_to_string(credential: &Credential) -> String {
24 match credential {
25 Credential::None(_) => String::from("None"),
26 Credential::Password(password) => {
27 format!("{} (type: password)", String::from_utf8_lossy(password))
28 }
29 Credential::Psk(psk) => format!("{} (type: psk)", String::from_utf8_lossy(psk)),
30 &_ => unimplemented!(),
31 }
32}
33
34#[derive(Clone)]
37pub struct NetworkConfigBuilder {
38 ssid: Option<Ssid>,
39 security_type: fidl_policy::SecurityType,
40 password: Option<Vec<u8>>,
41}
42
43impl NetworkConfigBuilder {
44 pub fn open() -> Self {
45 Self { ssid: None, security_type: fidl_policy::SecurityType::None, password: None }
46 }
47
48 pub fn protected(security_type: fidl_policy::SecurityType, password: &Vec<u8>) -> Self {
49 assert!(
50 fidl_policy::SecurityType::None != security_type,
51 "security_type for NetworkConfigBuilder::protected() cannot be None"
52 );
53 Self { ssid: None, security_type, password: Some(password.to_vec()) }
54 }
55
56 pub fn ssid(self, ssid: &Ssid) -> Self {
57 Self { ssid: Some(ssid.clone()), ..self }
58 }
59}
60
61impl From<NetworkConfigBuilder> for fidl_policy::NetworkConfig {
62 fn from(config: NetworkConfigBuilder) -> fidl_policy::NetworkConfig {
63 let ssid = match config.ssid {
64 None => Ssid::empty(),
65 Some(ssid) => ssid,
66 };
67
68 let (type_, credential) = match (config.security_type, config.password) {
69 (fidl_policy::SecurityType::None, Some(_)) => {
70 panic!("Password provided with fidl_policy::SecurityType::None")
71 }
72 (fidl_policy::SecurityType::None, None) => {
73 (fidl_policy::SecurityType::None, fidl_policy::Credential::None(fidl_policy::Empty))
74 }
75 (security_type, Some(password)) => {
76 (security_type, fidl_policy::Credential::Password(password))
77 }
78 (_, None) => {
79 panic!("Password not provided with fidl_policy::SecurityType other than None")
80 }
81 };
82
83 fidl_policy::NetworkConfig {
84 id: Some(fidl_policy::NetworkIdentifier { ssid: ssid.into(), type_ }),
85 credential: Some(credential),
86 ..Default::default()
87 }
88 }
89}
90
91pub async fn start_ap_and_wait_for_confirmation(
92 test_ns_prefix: &str,
93 network_config: NetworkConfigBuilder,
94) {
95 let network_config = NetworkConfigBuilder::from(network_config);
96
97 let ap_provider =
99 connect_to_protocol_at::<fidl_policy::AccessPointProviderMarker>(test_ns_prefix)
100 .expect("connecting to AP provider");
101 let (ap_controller, server_end) = create_proxy::<fidl_policy::AccessPointControllerMarker>();
102 let (update_client_end, update_server_end) =
103 create_endpoints::<fidl_policy::AccessPointStateUpdatesMarker>();
104 let () =
105 ap_provider.get_controller(server_end, update_client_end).expect("getting AP controller");
106
107 let mut update_stream = update_server_end.into_stream();
110 let initial_update = update_stream.next().await.expect("AP update stream failed");
111
112 let (_updates, responder) = initial_update
115 .expect("received invalid update")
116 .into_on_access_point_state_update()
117 .expect("AP provider produced invalid update.");
118 let () = responder.send().expect("failed to send update response");
119
120 let mut retry = RetryWithBackoff::new(zx::MonotonicDuration::from_seconds(120));
122 loop {
123 let controller = ap_controller.clone();
124
125 let config = fidl_policy::NetworkConfig::from(network_config.clone());
128 let connectivity_mode = fidl_policy::ConnectivityMode::Unrestricted;
129 let operating_band = fidl_policy::OperatingBand::Any;
130
131 match controller
134 .start_access_point(&config, connectivity_mode, operating_band)
135 .await
136 .expect("starting AP")
137 {
138 fidl_policy::RequestStatus::Acknowledged => break,
139 _ => (),
140 }
141
142 retry.sleep_unless_after_deadline().await.expect("unable to create AP iface");
143 }
144
145 while let Ok(update_request) = update_stream.next().await.expect("AP update stream failed") {
147 let (updates, responder) = update_request
148 .into_on_access_point_state_update()
149 .expect("AP provider produced invalid update.");
150
151 let () = responder.send().expect("failed to send update response");
152
153 for update in updates {
154 match update.state {
155 Some(fidl_policy::OperatingState::Failed) => panic!("Failed to start AP."),
156 Some(fidl_policy::OperatingState::Starting) | None => (),
157 Some(fidl_policy::OperatingState::Active) => return,
158 }
159 }
160 }
161 panic!("update stream ended unexpectedly");
162}
163
164pub async fn get_client_controller(
166 test_ns_prefix: &str,
167) -> (fidl_policy::ClientControllerProxy, fidl_policy::ClientStateUpdatesRequestStream) {
168 let provider =
169 connect_to_protocol_at::<fidl_policy::ClientProviderMarker>(test_ns_prefix).unwrap();
170 let (controller_client_end, controller_server_end) = fidl::endpoints::create_proxy();
171 let (listener_client_end, listener_server_end) = fidl::endpoints::create_endpoints();
172 provider.get_controller(controller_server_end, listener_client_end).unwrap();
173 let client_state_update_stream = listener_server_end.into_stream();
174
175 (controller_client_end, client_state_update_stream)
176}
177
178pub async fn init_client_controller(
181 test_ns_prefix: &str,
182) -> (fidl_policy::ClientControllerProxy, fidl_policy::ClientStateUpdatesRequestStream) {
183 let (controller_client_end, mut client_state_update_stream) =
184 get_client_controller(test_ns_prefix).await;
185 wait_until_client_state(&mut client_state_update_stream, |update| {
190 if update.state == Some(fidl_policy::WlanClientState::ConnectionsEnabled) {
191 return true;
192 } else {
193 info!("Awaiting client state ConnectionsEnabled, got {:?}", update.state);
194 return false;
195 }
196 })
197 .await;
198
199 (controller_client_end, client_state_update_stream)
200}
201
202pub async fn wait_until_client_state<F: Fn(fidl_policy::ClientStateSummary) -> bool>(
205 client_state_update_stream: &mut fidl_policy::ClientStateUpdatesRequestStream,
206 continue_fn: F,
207) {
208 while let Some(update_request) =
209 client_state_update_stream.try_next().await.expect("getting state update")
210 {
211 let (update, responder) =
212 update_request.into_on_client_state_update().expect("converting to state update");
213 let _ = responder.send();
214 if continue_fn(update.clone()) {
215 return;
216 } else {
217 info!("No matching state found: {:?}", update);
218 }
219 }
220 panic!("The stream unexpectedly terminated");
221}
222
223pub fn has_id_and_state(
224 update: fidl_policy::ClientStateSummary,
225 id_to_match: &NetworkIdentifier,
226 state_to_match: fidl_policy::ConnectionState,
227) -> bool {
228 for net_state in update.networks.expect("getting client networks") {
229 let id = net_state.id.clone().expect("empty network ID");
230 let state = net_state.state.clone().expect("empty network state");
231
232 if &id == id_to_match && state == state_to_match {
233 return true;
234 }
235 }
236 return false;
237}
238
239pub async fn save_network(
240 client_controller: &fidl_policy::ClientControllerProxy,
241 ssid: &Ssid,
242 security_type: SecurityType,
243 credential: fidl_policy::Credential,
244) {
245 info!("Saving network. SSID: {:?}, Credential: {:?}", ssid, credential_to_string(&credential),);
246 let network_config = create_network_config(ssid, security_type, credential);
247 client_controller
248 .save_network(&network_config)
249 .await
250 .expect("save_network future failed")
251 .expect("client controller failed to save network");
252}
253
254pub async fn remove_network(
255 client_controller: &fidl_policy::ClientControllerProxy,
256 ssid: &Ssid,
257 security_type: SecurityType,
258 credential: fidl_policy::Credential,
259) {
260 info!(
261 "Removing network. SSID: {}, Credential: {:?}",
262 ssid.to_string_not_redactable(),
263 credential_to_string(&credential)
264 );
265 let network_config = create_network_config(ssid, security_type, credential);
266 client_controller
267 .remove_network(&network_config)
268 .await
269 .expect("remove_network future failed")
270 .expect("client controller failed to remove network");
271 info!("Network removed. TODO(https://fxbug.dev/42081001#c4): remove this logging")
272}
273
274pub async fn remove_all_networks(client_controller: &fidl_policy::ClientControllerProxy) {
275 info!("Removing all saved networks");
276 let mut saved_networks = vec![];
277
278 let (iter, server) =
280 fidl::endpoints::create_proxy::<fidl_policy::NetworkConfigIteratorMarker>();
281 client_controller.get_saved_networks(server).expect("Failed to call get saved networks");
282 loop {
283 let additional_saved_networks =
284 iter.get_next().await.expect("Failed to read saved networks");
285 if additional_saved_networks.len() == 0 {
286 break;
287 } else {
288 saved_networks.extend(additional_saved_networks);
289 }
290 }
291
292 for network in saved_networks {
294 remove_network(
295 client_controller,
296 &network.id.clone().unwrap().ssid.try_into().unwrap(),
297 network.id.unwrap().type_.into(),
298 network.credential.unwrap(),
299 )
300 .await;
301 }
302}
303
304pub async fn await_failed(
305 mut client_state_update_stream: &mut fidl_policy::ClientStateUpdatesRequestStream,
306 network_identifier: fidl_policy::NetworkIdentifier,
307 disconnect_status: fidl_policy::DisconnectStatus,
308) {
309 wait_until_client_state(&mut client_state_update_stream, |update| {
310 if has_id_and_state(
311 update.clone(),
312 &network_identifier,
313 fidl_policy::ConnectionState::Failed,
314 ) {
315 assert_eq!(
316 update.networks,
317 Some(vec![fidl_policy::NetworkState {
318 id: Some(network_identifier.clone()),
319 state: Some(fidl_policy::ConnectionState::Failed),
320 status: Some(disconnect_status),
321 ..Default::default()
322 }])
323 );
324 true
325 } else {
326 false
327 }
328 })
329 .await;
330}