wlan_hw_sim/
wlancfg_helper.rs

1// Copyright 2021 The Fuchsia Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5use crate::test_utils::RetryWithBackoff;
6use fidl::endpoints::{create_endpoints, create_proxy};
7use fidl_fuchsia_wlan_policy as fidl_policy;
8use fidl_fuchsia_wlan_policy::{Credential, NetworkConfig, NetworkIdentifier, SecurityType};
9use fuchsia_component::client::connect_to_protocol_at;
10use futures::{StreamExt, TryStreamExt};
11use ieee80211::Ssid;
12use log::info;
13
14fn create_network_config(
15    ssid: &Ssid,
16    security_type: SecurityType,
17    credential: Credential,
18) -> NetworkConfig {
19    let network_id = NetworkIdentifier { ssid: ssid.to_vec(), type_: security_type };
20    NetworkConfig { id: Some(network_id), credential: Some(credential), ..Default::default() }
21}
22
23fn credential_to_string(credential: &Credential) -> String {
24    match credential {
25        Credential::None(_) => String::from("None"),
26        Credential::Password(password) => {
27            format!("{} (type: password)", String::from_utf8_lossy(password))
28        }
29        Credential::Psk(psk) => format!("{} (type: psk)", String::from_utf8_lossy(psk)),
30        &_ => unimplemented!(),
31    }
32}
33
34// Holds basic WLAN network configuration information and allows cloning and conversion to a policy
35// NetworkConfig.
36#[derive(Clone)]
37pub struct NetworkConfigBuilder {
38    ssid: Option<Ssid>,
39    security_type: fidl_policy::SecurityType,
40    password: Option<Vec<u8>>,
41}
42
43impl NetworkConfigBuilder {
44    pub fn open() -> Self {
45        Self { ssid: None, security_type: fidl_policy::SecurityType::None, password: None }
46    }
47
48    pub fn protected(security_type: fidl_policy::SecurityType, password: &Vec<u8>) -> Self {
49        assert!(
50            fidl_policy::SecurityType::None != security_type,
51            "security_type for NetworkConfigBuilder::protected() cannot be None"
52        );
53        Self { ssid: None, security_type, password: Some(password.to_vec()) }
54    }
55
56    pub fn ssid(self, ssid: &Ssid) -> Self {
57        Self { ssid: Some(ssid.clone()), ..self }
58    }
59}
60
61impl From<NetworkConfigBuilder> for fidl_policy::NetworkConfig {
62    fn from(config: NetworkConfigBuilder) -> fidl_policy::NetworkConfig {
63        let ssid = match config.ssid {
64            None => Ssid::empty(),
65            Some(ssid) => ssid,
66        };
67
68        let (type_, credential) = match (config.security_type, config.password) {
69            (fidl_policy::SecurityType::None, Some(_)) => {
70                panic!("Password provided with fidl_policy::SecurityType::None")
71            }
72            (fidl_policy::SecurityType::None, None) => {
73                (fidl_policy::SecurityType::None, fidl_policy::Credential::None(fidl_policy::Empty))
74            }
75            (security_type, Some(password)) => {
76                (security_type, fidl_policy::Credential::Password(password))
77            }
78            (_, None) => {
79                panic!("Password not provided with fidl_policy::SecurityType other than None")
80            }
81        };
82
83        fidl_policy::NetworkConfig {
84            id: Some(fidl_policy::NetworkIdentifier { ssid: ssid.into(), type_ }),
85            credential: Some(credential),
86            ..Default::default()
87        }
88    }
89}
90
91pub async fn start_ap_and_wait_for_confirmation(
92    test_ns_prefix: &str,
93    network_config: NetworkConfigBuilder,
94) {
95    let network_config = NetworkConfigBuilder::from(network_config);
96
97    // Get a handle to control the AccessPointController.
98    let ap_provider =
99        connect_to_protocol_at::<fidl_policy::AccessPointProviderMarker>(test_ns_prefix)
100            .expect("connecting to AP provider");
101    let (ap_controller, server_end) = create_proxy::<fidl_policy::AccessPointControllerMarker>();
102    let (update_client_end, update_server_end) =
103        create_endpoints::<fidl_policy::AccessPointStateUpdatesMarker>();
104    let () =
105        ap_provider.get_controller(server_end, update_client_end).expect("getting AP controller");
106
107    // Clear the initial update to ensure that the 'Active' update is received once the AP is
108    // started.
109    let mut update_stream = update_server_end.into_stream();
110    let initial_update = update_stream.next().await.expect("AP update stream failed");
111
112    // The initial update is empty since no AP ifaces have been created yet.  All that is required
113    // is to ACK the initial update.
114    let (_updates, responder) = initial_update
115        .expect("received invalid update")
116        .into_on_access_point_state_update()
117        .expect("AP provider produced invalid update.");
118    let () = responder.send().expect("failed to send update response");
119
120    // Start the AP
121    let mut retry = RetryWithBackoff::new(zx::MonotonicDuration::from_seconds(120));
122    loop {
123        let controller = ap_controller.clone();
124
125        // Call StartAccessPoint.  If the policy layer does not yet have an ApSmeProxy, it
126        // it will attempt to create an AP interface.
127        let config = fidl_policy::NetworkConfig::from(network_config.clone());
128        let connectivity_mode = fidl_policy::ConnectivityMode::Unrestricted;
129        let operating_band = fidl_policy::OperatingBand::Any;
130
131        // If the policy layer acknowledges the request to start the access point, then the
132        // AP interface has been created.
133        match controller
134            .start_access_point(&config, connectivity_mode, operating_band)
135            .await
136            .expect("starting AP")
137        {
138            fidl_policy::RequestStatus::Acknowledged => break,
139            _ => (),
140        }
141
142        retry.sleep_unless_after_deadline().await.expect("unable to create AP iface");
143    }
144
145    // Wait until the policy service notifies that the AP has started.
146    while let Ok(update_request) = update_stream.next().await.expect("AP update stream failed") {
147        let (updates, responder) = update_request
148            .into_on_access_point_state_update()
149            .expect("AP provider produced invalid update.");
150
151        let () = responder.send().expect("failed to send update response");
152
153        for update in updates {
154            match update.state {
155                Some(fidl_policy::OperatingState::Failed) => panic!("Failed to start AP."),
156                Some(fidl_policy::OperatingState::Starting) | None => (),
157                Some(fidl_policy::OperatingState::Active) => return,
158            }
159        }
160    }
161    panic!("update stream ended unexpectedly");
162}
163
164/// Creates a client controller and update stream for getting status updates.
165pub async fn get_client_controller(
166    test_ns_prefix: &str,
167) -> (fidl_policy::ClientControllerProxy, fidl_policy::ClientStateUpdatesRequestStream) {
168    let provider =
169        connect_to_protocol_at::<fidl_policy::ClientProviderMarker>(test_ns_prefix).unwrap();
170    let (controller_client_end, controller_server_end) = fidl::endpoints::create_proxy();
171    let (listener_client_end, listener_server_end) = fidl::endpoints::create_endpoints();
172    provider.get_controller(controller_server_end, listener_client_end).unwrap();
173    let client_state_update_stream = listener_server_end.into_stream();
174
175    (controller_client_end, client_state_update_stream)
176}
177
178/// Creates a client controller and update stream, and wait to verify that client connections are
179/// enabled.
180pub async fn init_client_controller(
181    test_ns_prefix: &str,
182) -> (fidl_policy::ClientControllerProxy, fidl_policy::ClientStateUpdatesRequestStream) {
183    let (controller_client_end, mut client_state_update_stream) =
184        get_client_controller(test_ns_prefix).await;
185    // Clear the initial state notifications that are sent by the policy layer.  This initial state
186    // is variable depending on whether or not the policy layer has discovered a PHY or created an
187    // interface yet.  The policy layer enables client connections by default.  Wait until the
188    // first update that indicates that client connections are enabled before proceeding.
189    wait_until_client_state(&mut client_state_update_stream, |update| {
190        if update.state == Some(fidl_policy::WlanClientState::ConnectionsEnabled) {
191            return true;
192        } else {
193            info!("Awaiting client state ConnectionsEnabled, got {:?}", update.state);
194            return false;
195        }
196    })
197    .await;
198
199    (controller_client_end, client_state_update_stream)
200}
201
202// Wait until the policy layer returns an update for which `continue_fn` returns true.
203// This function will panic if the `client_state_update_stream` stream ends.
204pub async fn wait_until_client_state<F: Fn(fidl_policy::ClientStateSummary) -> bool>(
205    client_state_update_stream: &mut fidl_policy::ClientStateUpdatesRequestStream,
206    continue_fn: F,
207) {
208    while let Some(update_request) =
209        client_state_update_stream.try_next().await.expect("getting state update")
210    {
211        let (update, responder) =
212            update_request.into_on_client_state_update().expect("converting to state update");
213        let _ = responder.send();
214        if continue_fn(update.clone()) {
215            return;
216        } else {
217            info!("No matching state found: {:?}", update);
218        }
219    }
220    panic!("The stream unexpectedly terminated");
221}
222
223pub fn has_id_and_state(
224    update: fidl_policy::ClientStateSummary,
225    id_to_match: &NetworkIdentifier,
226    state_to_match: fidl_policy::ConnectionState,
227) -> bool {
228    for net_state in update.networks.expect("getting client networks") {
229        let id = net_state.id.clone().expect("empty network ID");
230        let state = net_state.state.clone().expect("empty network state");
231
232        if &id == id_to_match && state == state_to_match {
233            return true;
234        }
235    }
236    return false;
237}
238
239pub async fn save_network(
240    client_controller: &fidl_policy::ClientControllerProxy,
241    ssid: &Ssid,
242    security_type: SecurityType,
243    credential: fidl_policy::Credential,
244) {
245    info!("Saving network. SSID: {:?}, Credential: {:?}", ssid, credential_to_string(&credential),);
246    let network_config = create_network_config(ssid, security_type, credential);
247    client_controller
248        .save_network(&network_config)
249        .await
250        .expect("save_network future failed")
251        .expect("client controller failed to save network");
252}
253
254pub async fn remove_network(
255    client_controller: &fidl_policy::ClientControllerProxy,
256    ssid: &Ssid,
257    security_type: SecurityType,
258    credential: fidl_policy::Credential,
259) {
260    info!(
261        "Removing network. SSID: {}, Credential: {:?}",
262        ssid.to_string_not_redactable(),
263        credential_to_string(&credential)
264    );
265    let network_config = create_network_config(ssid, security_type, credential);
266    client_controller
267        .remove_network(&network_config)
268        .await
269        .expect("remove_network future failed")
270        .expect("client controller failed to remove network");
271    info!("Network removed. TODO(https://fxbug.dev/42081001#c4): remove this logging")
272}
273
274pub async fn remove_all_networks(client_controller: &fidl_policy::ClientControllerProxy) {
275    info!("Removing all saved networks");
276    let mut saved_networks = vec![];
277
278    // Read all saved networks on the device
279    let (iter, server) =
280        fidl::endpoints::create_proxy::<fidl_policy::NetworkConfigIteratorMarker>();
281    client_controller.get_saved_networks(server).expect("Failed to call get saved networks");
282    loop {
283        let additional_saved_networks =
284            iter.get_next().await.expect("Failed to read saved networks");
285        if additional_saved_networks.len() == 0 {
286            break;
287        } else {
288            saved_networks.extend(additional_saved_networks);
289        }
290    }
291
292    // Remove each saved network
293    for network in saved_networks {
294        remove_network(
295            client_controller,
296            &network.id.clone().unwrap().ssid.try_into().unwrap(),
297            network.id.unwrap().type_.into(),
298            network.credential.unwrap(),
299        )
300        .await;
301    }
302}
303
304pub async fn await_failed(
305    mut client_state_update_stream: &mut fidl_policy::ClientStateUpdatesRequestStream,
306    network_identifier: fidl_policy::NetworkIdentifier,
307    disconnect_status: fidl_policy::DisconnectStatus,
308) {
309    wait_until_client_state(&mut client_state_update_stream, |update| {
310        if has_id_and_state(
311            update.clone(),
312            &network_identifier,
313            fidl_policy::ConnectionState::Failed,
314        ) {
315            assert_eq!(
316                update.networks,
317                Some(vec![fidl_policy::NetworkState {
318                    id: Some(network_identifier.clone()),
319                    state: Some(fidl_policy::ConnectionState::Failed),
320                    status: Some(disconnect_status),
321                    ..Default::default()
322                }])
323            );
324            true
325        } else {
326            false
327        }
328    })
329    .await;
330}