#!/usr/bin/env python3 # # Copyright 2017 - Google # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. """ Base Class for Defining Common WiFi Test Functionality """ import contextlib import copy import logging import os import time from acts import asserts from acts import context from acts import signals from acts import utils from acts.base_test import BaseTestClass from acts.controllers.ap_lib import hostapd_ap_preset from acts.controllers.ap_lib import hostapd_bss_settings from acts.controllers.ap_lib import hostapd_constants from acts.controllers.ap_lib import hostapd_security from acts.keys import Config from acts_contrib.test_utils.net import net_test_utils as nutils from acts_contrib.test_utils.wifi import wifi_test_utils as wutils from mobly.base_test import STAGE_NAME_TEARDOWN_CLASS WifiEnums = wutils.WifiEnums AP_1 = 0 AP_2 = 1 MAX_AP_COUNT = 2 @contextlib.contextmanager def logged_suppress(message: str, allow_test_fail: bool = False): """Suppresses any Exceptions and logs the outcome. This is to make sure all steps in every test class's teardown_test/on_fail are executed even if super().teardown_test() or super().on_fail() is called at the very beginning. Args: message: message to describe the error. allow_test_fail: True to re-raise the exception, False to suppress it. Yields: None """ try: yield except signals.TestFailure: if allow_test_fail: raise logging.exception(message) class WifiBaseTest(BaseTestClass): def __init__(self, configs): super().__init__(configs) self.enable_packet_log = False self.packet_log_2g = hostapd_constants.AP_DEFAULT_CHANNEL_2G self.packet_log_5g = hostapd_constants.AP_DEFAULT_CHANNEL_5G self.tcpdump_proc = [] self.packet_log_pid = {} def setup_class(self): if hasattr(self, 'attenuators') and self.attenuators: for attenuator in self.attenuators: attenuator.set_atten(0) opt_param = ["country_code_file"] self.unpack_userparams(opt_param_names=opt_param) if self.enable_packet_log and hasattr(self, "packet_capture"): self.packet_logger = self.packet_capture[0] self.packet_logger.configure_monitor_mode("2G", self.packet_log_2g) self.packet_logger.configure_monitor_mode("5G", self.packet_log_5g) if hasattr(self, "android_devices"): for ad in self.android_devices: wutils.wifi_test_device_init(ad) if hasattr(self, "country_code_file"): if isinstance(self.country_code_file, list): self.country_code_file = self.country_code_file[0] if not os.path.isfile(self.country_code_file): self.country_code_file = os.path.join( self.user_params[Config.key_config_path.value], self.country_code_file) self.country_code = utils.load_config( self.country_code_file)["country"] else: self.country_code = WifiEnums.CountryCode.US wutils.set_wifi_country_code(ad, self.country_code) def setup_test(self): if (hasattr(self, "android_devices")): wutils.start_all_wlan_logs(self.android_devices) self.tcpdump_proc = [] if hasattr(self, "android_devices"): for ad in self.android_devices: proc = nutils.start_tcpdump(ad, self.test_name) self.tcpdump_proc.append((ad, proc)) # Delete any existing ssrdumps. ad.log.info("Deleting existing ssrdumps") ad.adb.shell("find /data/vendor/ssrdump/ -type f -delete", ignore_status=True) if hasattr(self, "packet_logger"): self.packet_log_pid = wutils.start_pcap(self.packet_logger, 'dual', self.test_name) def teardown_test(self): with logged_suppress("SubSystem Restart(SSR) Exception.", allow_test_fail=True): self._check_ssrdumps() if (hasattr(self, "android_devices")): wutils.stop_all_wlan_logs(self.android_devices) for proc in self.tcpdump_proc: nutils.stop_tcpdump(proc[0], proc[1], self.test_name, pull_dump=False) self.tcpdump_proc = [] if hasattr(self, "packet_logger") and self.packet_log_pid: wutils.stop_pcap(self.packet_logger, self.packet_log_pid, test_status=True) self.packet_log_pid = {} def teardown_class(self): begin_time = utils.get_current_epoch_time() super().teardown_class() for device in getattr(self, "fuchsia_devices", []): device.take_bug_report(STAGE_NAME_TEARDOWN_CLASS, begin_time) def on_fail(self, test_name, begin_time): if hasattr(self, "android_devices"): for ad in self.android_devices: ad.take_bug_report(test_name, begin_time) ad.cat_adb_log(test_name, begin_time) wutils.stop_all_wlan_logs(self.android_devices) for ad in self.android_devices: wutils.get_wlan_logs(ad) for proc in self.tcpdump_proc: nutils.stop_tcpdump(proc[0], proc[1], self.test_name) self.tcpdump_proc = [] if hasattr(self, "packet_logger") and self.packet_log_pid: wutils.stop_pcap(self.packet_logger, self.packet_log_pid, test_status=False) self.packet_log_pid = {} # Gets a wlan_device log and calls the generic device fail on DUT. for device in getattr(self, "fuchsia_devices", []): self.on_device_fail(device, test_name, begin_time) def _check_ssrdumps(self): """Failed the test if SubSystem Restart occurred on any device.""" is_ramdump_happened = False if (hasattr(self, "android_devices")): for ad in self.android_devices: wutils.get_ssrdumps(ad) if wutils.has_ssrdumps(ad): is_ramdump_happened = True if is_ramdump_happened: raise signals.TestFailure( f"SubSystem Restart(SSR) occurred on " f"{self.TAG}:{self.current_test_name}") def on_device_fail(self, device, test_name, begin_time): """Gets a generic device DUT bug report. This method takes a bug report if the device has the 'take_bug_report_on_fail' config value, and if the flag is true. This method also power cycles if 'hard_reboot_on_fail' is True. Args: device: Generic device to gather logs from. test_name: Name of the test that triggered this function. begin_time: Logline format timestamp taken when the test started. """ if (not hasattr(device, "take_bug_report_on_fail") or device.take_bug_report_on_fail): device.take_bug_report(test_name, begin_time) if hasattr(device, "hard_reboot_on_fail") and device.hard_reboot_on_fail: device.reboot(reboot_type='hard', testbed_pdus=self.pdu_devices) def download_ap_logs(self): """Downloads the DHCP and hostapad logs from the access_point. Using the current TestClassContext and TestCaseContext this method pulls the DHCP and hostapd logs and outputs them to the correct path. """ current_path = context.get_current_context().get_full_output_path() dhcp_full_out_path = os.path.join(current_path, "dhcp_log.txt") dhcp_log = self.access_point.get_dhcp_logs() if dhcp_log: dhcp_log_file = open(dhcp_full_out_path, 'w') dhcp_log_file.write(dhcp_log) dhcp_log_file.close() hostapd_logs = self.access_point.get_hostapd_logs() for interface in hostapd_logs: out_name = interface + "_hostapd_log.txt" hostapd_full_out_path = os.path.join(current_path, out_name) hostapd_log_file = open(hostapd_full_out_path, 'w') hostapd_log_file.write(hostapd_logs[interface]) hostapd_log_file.close() def get_psk_network( self, mirror_ap, reference_networks, hidden=False, same_ssid=False, security_mode=hostapd_constants.WPA2_STRING, ssid_length_2g=hostapd_constants.AP_SSID_LENGTH_2G, ssid_length_5g=hostapd_constants.AP_SSID_LENGTH_5G, passphrase_length_2g=hostapd_constants.AP_PASSPHRASE_LENGTH_2G, passphrase_length_5g=hostapd_constants.AP_PASSPHRASE_LENGTH_5G): """Generates SSID and passphrase for a WPA2 network using random generator. Args: mirror_ap: Boolean, determines if both APs use the same hostapd config or different configs. reference_networks: List of PSK networks. same_ssid: Boolean, determines if both bands on AP use the same SSID. ssid_length_2gecond AP Int, number of characters to use for 2G SSID. ssid_length_5g: Int, number of characters to use for 5G SSID. passphrase_length_2g: Int, length of password for 2G network. passphrase_length_5g: Int, length of password for 5G network. Returns: A dict of 2G and 5G network lists for hostapd configuration. """ network_dict_2g = {} network_dict_5g = {} ref_5g_security = security_mode ref_2g_security = security_mode if same_ssid: ref_2g_ssid = 'xg_%s' % utils.rand_ascii_str(ssid_length_2g) ref_5g_ssid = ref_2g_ssid ref_2g_passphrase = utils.rand_ascii_str(passphrase_length_2g) ref_5g_passphrase = ref_2g_passphrase else: ref_2g_ssid = '2g_%s' % utils.rand_ascii_str(ssid_length_2g) ref_2g_passphrase = utils.rand_ascii_str(passphrase_length_2g) ref_5g_ssid = '5g_%s' % utils.rand_ascii_str(ssid_length_5g) ref_5g_passphrase = utils.rand_ascii_str(passphrase_length_5g) network_dict_2g = { "SSID": ref_2g_ssid, "security": ref_2g_security, "password": ref_2g_passphrase, "hiddenSSID": hidden } network_dict_5g = { "SSID": ref_5g_ssid, "security": ref_5g_security, "password": ref_5g_passphrase, "hiddenSSID": hidden } ap = 0 for ap in range(MAX_AP_COUNT): reference_networks.append({ "2g": copy.copy(network_dict_2g), "5g": copy.copy(network_dict_5g) }) if not mirror_ap: break return {"2g": network_dict_2g, "5g": network_dict_5g} def get_open_network(self, mirror_ap, open_network, hidden=False, same_ssid=False, ssid_length_2g=hostapd_constants.AP_SSID_LENGTH_2G, ssid_length_5g=hostapd_constants.AP_SSID_LENGTH_5G, security_mode='none'): """Generates SSIDs for a open network using a random generator. Args: mirror_ap: Boolean, determines if both APs use the same hostapd config or different configs. open_network: List of open networks. same_ssid: Boolean, determines if both bands on AP use the same SSID. ssid_length_2g: Int, number of characters to use for 2G SSID. ssid_length_5g: Int, number of characters to use for 5G SSID. security_mode: 'none' for open and 'OWE' for WPA3 OWE. Returns: A dict of 2G and 5G network lists for hostapd configuration. """ network_dict_2g = {} network_dict_5g = {} if same_ssid: open_2g_ssid = 'xg_%s' % utils.rand_ascii_str(ssid_length_2g) open_5g_ssid = open_2g_ssid else: open_2g_ssid = '2g_%s' % utils.rand_ascii_str(ssid_length_2g) open_5g_ssid = '5g_%s' % utils.rand_ascii_str(ssid_length_5g) network_dict_2g = { "SSID": open_2g_ssid, "security": security_mode, "hiddenSSID": hidden } network_dict_5g = { "SSID": open_5g_ssid, "security": security_mode, "hiddenSSID": hidden } ap = 0 for ap in range(MAX_AP_COUNT): open_network.append({ "2g": copy.copy(network_dict_2g), "5g": copy.copy(network_dict_5g) }) if not mirror_ap: break return {"2g": network_dict_2g, "5g": network_dict_5g} def get_wep_network( self, mirror_ap, networks, hidden=False, same_ssid=False, ssid_length_2g=hostapd_constants.AP_SSID_LENGTH_2G, ssid_length_5g=hostapd_constants.AP_SSID_LENGTH_5G, passphrase_length_2g=hostapd_constants.AP_PASSPHRASE_LENGTH_2G, passphrase_length_5g=hostapd_constants.AP_PASSPHRASE_LENGTH_5G): """Generates SSID and passphrase for a WEP network using random generator. Args: mirror_ap: Boolean, determines if both APs use the same hostapd config or different configs. networks: List of WEP networks. same_ssid: Boolean, determines if both bands on AP use the same SSID. ssid_length_2gecond AP Int, number of characters to use for 2G SSID. ssid_length_5g: Int, number of characters to use for 5G SSID. passphrase_length_2g: Int, length of password for 2G network. passphrase_length_5g: Int, length of password for 5G network. Returns: A dict of 2G and 5G network lists for hostapd configuration. """ network_dict_2g = {} network_dict_5g = {} ref_5g_security = hostapd_constants.WEP_STRING ref_2g_security = hostapd_constants.WEP_STRING if same_ssid: ref_2g_ssid = 'xg_%s' % utils.rand_ascii_str(ssid_length_2g) ref_5g_ssid = ref_2g_ssid ref_2g_passphrase = utils.rand_hex_str(passphrase_length_2g) ref_5g_passphrase = ref_2g_passphrase else: ref_2g_ssid = '2g_%s' % utils.rand_ascii_str(ssid_length_2g) ref_2g_passphrase = utils.rand_hex_str(passphrase_length_2g) ref_5g_ssid = '5g_%s' % utils.rand_ascii_str(ssid_length_5g) ref_5g_passphrase = utils.rand_hex_str(passphrase_length_5g) network_dict_2g = { "SSID": ref_2g_ssid, "security": ref_2g_security, "wepKeys": [ref_2g_passphrase] * 4, "hiddenSSID": hidden } network_dict_5g = { "SSID": ref_5g_ssid, "security": ref_5g_security, "wepKeys": [ref_2g_passphrase] * 4, "hiddenSSID": hidden } ap = 0 for ap in range(MAX_AP_COUNT): networks.append({ "2g": copy.copy(network_dict_2g), "5g": copy.copy(network_dict_5g) }) if not mirror_ap: break return {"2g": network_dict_2g, "5g": network_dict_5g} def update_bssid(self, ap_instance, ap, network, band): """Get bssid and update network dictionary. Args: ap_instance: Accesspoint index that was configured. ap: Accesspoint object corresponding to ap_instance. network: Network dictionary. band: Wifi networks' band. """ bssid = ap.get_bssid_from_ssid(network["SSID"], band) if network["security"] == hostapd_constants.WPA2_STRING: # TODO:(bamahadev) Change all occurances of reference_networks # to wpa_networks. self.reference_networks[ap_instance][band]["bssid"] = bssid if network["security"] == hostapd_constants.WPA_STRING: self.wpa_networks[ap_instance][band]["bssid"] = bssid if network["security"] == hostapd_constants.WEP_STRING: self.wep_networks[ap_instance][band]["bssid"] = bssid if network["security"] == hostapd_constants.ENT_STRING: if "bssid" not in self.ent_networks[ap_instance][band]: self.ent_networks[ap_instance][band]["bssid"] = bssid else: self.ent_networks_pwd[ap_instance][band]["bssid"] = bssid if network["security"] == 'none': self.open_network[ap_instance][band]["bssid"] = bssid def populate_bssid(self, ap_instance, ap, networks_5g, networks_2g): """Get bssid for a given SSID and add it to the network dictionary. Args: ap_instance: Accesspoint index that was configured. ap: Accesspoint object corresponding to ap_instance. networks_5g: List of 5g networks configured on the APs. networks_2g: List of 2g networks configured on the APs. """ if not (networks_5g or networks_2g): return for network in networks_5g: if 'channel' in network: continue self.update_bssid(ap_instance, ap, network, hostapd_constants.BAND_5G) for network in networks_2g: if 'channel' in network: continue self.update_bssid(ap_instance, ap, network, hostapd_constants.BAND_2G) def configure_openwrt_ap_and_start( self, channel_5g=hostapd_constants.AP_DEFAULT_CHANNEL_5G, channel_2g=hostapd_constants.AP_DEFAULT_CHANNEL_2G, channel_5g_ap2=None, channel_2g_ap2=None, ssid_length_2g=hostapd_constants.AP_SSID_LENGTH_2G, passphrase_length_2g=hostapd_constants.AP_PASSPHRASE_LENGTH_2G, ssid_length_5g=hostapd_constants.AP_SSID_LENGTH_5G, passphrase_length_5g=hostapd_constants.AP_PASSPHRASE_LENGTH_5G, mirror_ap=False, hidden=False, same_ssid=False, open_network=False, wpa1_network=False, wpa_network=False, wep_network=False, ent_network=False, ent_network_pwd=False, owe_network=False, sae_network=False, saemixed_network=False, radius_conf_2g=None, radius_conf_5g=None, radius_conf_pwd=None, ap_count=1, ieee80211w=None): """Create, configure and start OpenWrt AP. Args: channel_5g: 5G channel to configure. channel_2g: 2G channel to configure. channel_5g_ap2: 5G channel to configure on AP2. channel_2g_ap2: 2G channel to configure on AP2. ssid_length_2g: Int, number of characters to use for 2G SSID. passphrase_length_2g: Int, length of password for 2G network. ssid_length_5g: Int, number of characters to use for 5G SSID. passphrase_length_5g: Int, length of password for 5G network. same_ssid: Boolean, determines if both bands on AP use the same SSID. open_network: Boolean, to check if open network should be configured. wpa_network: Boolean, to check if wpa network should be configured. wep_network: Boolean, to check if wep network should be configured. ent_network: Boolean, to check if ent network should be configured. ent_network_pwd: Boolean, to check if ent pwd network should be configured. owe_network: Boolean, to check if owe network should be configured. sae_network: Boolean, to check if sae network should be configured. saemixed_network: Boolean, to check if saemixed network should be configured. radius_conf_2g: dictionary with enterprise radius server details. radius_conf_5g: dictionary with enterprise radius server details. radius_conf_pwd: dictionary with enterprise radiuse server details. ap_count: APs to configure. ieee80211w:PMF to configure """ if mirror_ap and ap_count == 1: raise ValueError("ap_count cannot be 1 if mirror_ap is True.") if (channel_5g_ap2 or channel_2g_ap2) and ap_count == 1: raise ValueError( "ap_count cannot be 1 if channels of AP2 are provided.") # we are creating a channel list for 2G and 5G bands. The list is of # size 2 and this is based on the assumption that each testbed will have # at most 2 APs. if not channel_5g_ap2: channel_5g_ap2 = channel_5g if not channel_2g_ap2: channel_2g_ap2 = channel_2g channels_2g = [channel_2g, channel_2g_ap2] channels_5g = [channel_5g, channel_5g_ap2] self.reference_networks = [] self.wpa1_networks = [] self.wpa_networks = [] self.wep_networks = [] self.ent_networks = [] self.ent_networks_pwd = [] self.open_network = [] self.owe_networks = [] self.sae_networks = [] self.saemixed_networks = [] self.bssid_map = [] for i in range(ap_count): network_list = [] if wpa1_network: wpa1_dict = self.get_psk_network(mirror_ap, self.wpa1_networks, hidden, same_ssid, ssid_length_2g, ssid_length_5g, passphrase_length_2g, passphrase_length_5g) wpa1_dict[hostapd_constants.BAND_2G]["security"] = "psk" wpa1_dict[hostapd_constants.BAND_5G]["security"] = "psk" wpa1_dict[hostapd_constants.BAND_2G]["ieee80211w"] = ieee80211w wpa1_dict[hostapd_constants.BAND_5G]["ieee80211w"] = ieee80211w self.wpa1_networks.append(wpa1_dict) network_list.append(wpa1_dict) if wpa_network: wpa_dict = self.get_psk_network(mirror_ap, self.reference_networks, hidden, same_ssid, ssid_length_2g, ssid_length_5g, passphrase_length_2g, passphrase_length_5g) wpa_dict[hostapd_constants.BAND_2G]["security"] = "psk2" wpa_dict[hostapd_constants.BAND_5G]["security"] = "psk2" wpa_dict[hostapd_constants.BAND_2G]["ieee80211w"] = ieee80211w wpa_dict[hostapd_constants.BAND_5G]["ieee80211w"] = ieee80211w self.wpa_networks.append(wpa_dict) network_list.append(wpa_dict) if wep_network: wep_dict = self.get_wep_network(mirror_ap, self.wep_networks, hidden, same_ssid, ssid_length_2g, ssid_length_5g) network_list.append(wep_dict) if ent_network: ent_dict = self.get_open_network(mirror_ap, self.ent_networks, hidden, same_ssid, ssid_length_2g, ssid_length_5g) ent_dict["2g"]["security"] = "wpa2" ent_dict["2g"].update(radius_conf_2g) ent_dict["5g"]["security"] = "wpa2" ent_dict["5g"].update(radius_conf_5g) network_list.append(ent_dict) if ent_network_pwd: ent_pwd_dict = self.get_open_network(mirror_ap, self.ent_networks_pwd, hidden, same_ssid, ssid_length_2g, ssid_length_5g) ent_pwd_dict["2g"]["security"] = "wpa2" ent_pwd_dict["2g"].update(radius_conf_pwd) ent_pwd_dict["5g"]["security"] = "wpa2" ent_pwd_dict["5g"].update(radius_conf_pwd) network_list.append(ent_pwd_dict) if open_network: open_dict = self.get_open_network(mirror_ap, self.open_network, hidden, same_ssid, ssid_length_2g, ssid_length_5g) network_list.append(open_dict) if owe_network: owe_dict = self.get_open_network(mirror_ap, self.owe_networks, hidden, same_ssid, ssid_length_2g, ssid_length_5g, "OWE") owe_dict[hostapd_constants.BAND_2G]["security"] = "owe" owe_dict[hostapd_constants.BAND_5G]["security"] = "owe" network_list.append(owe_dict) if sae_network: sae_dict = self.get_psk_network(mirror_ap, self.sae_networks, hidden, same_ssid, hostapd_constants.SAE_KEY_MGMT, ssid_length_2g, ssid_length_5g, passphrase_length_2g, passphrase_length_5g) sae_dict[hostapd_constants.BAND_2G]["security"] = "sae" sae_dict[hostapd_constants.BAND_5G]["security"] = "sae" network_list.append(sae_dict) if saemixed_network: saemixed_dict = self.get_psk_network( mirror_ap, self.saemixed_networks, hidden, same_ssid, hostapd_constants.SAE_KEY_MGMT, ssid_length_2g, ssid_length_5g, passphrase_length_2g, passphrase_length_5g) saemixed_dict[ hostapd_constants.BAND_2G]["security"] = "sae-mixed" saemixed_dict[ hostapd_constants.BAND_5G]["security"] = "sae-mixed" saemixed_dict[ hostapd_constants.BAND_2G]["ieee80211w"] = ieee80211w saemixed_dict[ hostapd_constants.BAND_5G]["ieee80211w"] = ieee80211w network_list.append(saemixed_dict) self.access_points[i].configure_ap(network_list, channels_2g[i], channels_5g[i]) self.access_points[i].start_ap() self.bssid_map.append( self.access_points[i].get_bssids_for_wifi_networks()) if mirror_ap: self.access_points[i + 1].configure_ap(network_list, channels_2g[i + 1], channels_5g[i + 1]) self.access_points[i + 1].start_ap() self.bssid_map.append( self.access_points[i + 1].get_bssids_for_wifi_networks()) break def legacy_configure_ap_and_start( self, channel_5g=hostapd_constants.AP_DEFAULT_CHANNEL_5G, channel_2g=hostapd_constants.AP_DEFAULT_CHANNEL_2G, max_2g_networks=hostapd_constants.AP_DEFAULT_MAX_SSIDS_2G, max_5g_networks=hostapd_constants.AP_DEFAULT_MAX_SSIDS_5G, ap_ssid_length_2g=hostapd_constants.AP_SSID_LENGTH_2G, ap_passphrase_length_2g=hostapd_constants.AP_PASSPHRASE_LENGTH_2G, ap_ssid_length_5g=hostapd_constants.AP_SSID_LENGTH_5G, ap_passphrase_length_5g=hostapd_constants.AP_PASSPHRASE_LENGTH_5G, hidden=False, same_ssid=False, mirror_ap=True, wpa_network=False, wep_network=False, ent_network=False, radius_conf_2g=None, radius_conf_5g=None, ent_network_pwd=False, radius_conf_pwd=None, ap_count=1): config_count = 1 count = 0 # For example, the NetworkSelector tests use 2 APs and require that # both APs are not mirrored. if not mirror_ap and ap_count == 1: raise ValueError("ap_count cannot be 1 if mirror_ap is False.") if not mirror_ap: config_count = ap_count self.user_params["reference_networks"] = [] self.user_params["open_network"] = [] if wpa_network: self.user_params["wpa_networks"] = [] if wep_network: self.user_params["wep_networks"] = [] if ent_network: self.user_params["ent_networks"] = [] if ent_network_pwd: self.user_params["ent_networks_pwd"] = [] # kill hostapd & dhcpd if the cleanup was not successful for i in range(len(self.access_points)): self.log.debug("Check ap state and cleanup") self._cleanup_hostapd_and_dhcpd(i) for count in range(config_count): network_list_2g = [] network_list_5g = [] orig_network_list_2g = [] orig_network_list_5g = [] network_list_2g.append({"channel": channel_2g}) network_list_5g.append({"channel": channel_5g}) networks_dict = self.get_psk_network( mirror_ap, self.user_params["reference_networks"], hidden=hidden, same_ssid=same_ssid) self.reference_networks = self.user_params["reference_networks"] network_list_2g.append(networks_dict["2g"]) network_list_5g.append(networks_dict["5g"]) # When same_ssid is set, only configure one set of WPA networks. # We cannot have more than one set because duplicate interface names # are not allowed. # TODO(bmahadev): Provide option to select the type of network, # instead of defaulting to WPA. if not same_ssid: networks_dict = self.get_open_network( mirror_ap, self.user_params["open_network"], hidden=hidden, same_ssid=same_ssid) self.open_network = self.user_params["open_network"] network_list_2g.append(networks_dict["2g"]) network_list_5g.append(networks_dict["5g"]) if wpa_network: networks_dict = self.get_psk_network( mirror_ap, self.user_params["wpa_networks"], hidden=hidden, same_ssid=same_ssid, security_mode=hostapd_constants.WPA_STRING) self.wpa_networks = self.user_params["wpa_networks"] network_list_2g.append(networks_dict["2g"]) network_list_5g.append(networks_dict["5g"]) if wep_network: networks_dict = self.get_wep_network( mirror_ap, self.user_params["wep_networks"], hidden=hidden, same_ssid=same_ssid) self.wep_networks = self.user_params["wep_networks"] network_list_2g.append(networks_dict["2g"]) network_list_5g.append(networks_dict["5g"]) if ent_network: networks_dict = self.get_open_network( mirror_ap, self.user_params["ent_networks"], hidden=hidden, same_ssid=same_ssid) networks_dict["2g"][ "security"] = hostapd_constants.ENT_STRING networks_dict["2g"].update(radius_conf_2g) networks_dict["5g"][ "security"] = hostapd_constants.ENT_STRING networks_dict["5g"].update(radius_conf_5g) self.ent_networks = self.user_params["ent_networks"] network_list_2g.append(networks_dict["2g"]) network_list_5g.append(networks_dict["5g"]) if ent_network_pwd: networks_dict = self.get_open_network( mirror_ap, self.user_params["ent_networks_pwd"], hidden=hidden, same_ssid=same_ssid) networks_dict["2g"][ "security"] = hostapd_constants.ENT_STRING networks_dict["2g"].update(radius_conf_pwd) networks_dict["5g"][ "security"] = hostapd_constants.ENT_STRING networks_dict["5g"].update(radius_conf_pwd) self.ent_networks_pwd = self.user_params[ "ent_networks_pwd"] network_list_2g.append(networks_dict["2g"]) network_list_5g.append(networks_dict["5g"]) orig_network_list_5g = copy.copy(network_list_5g) orig_network_list_2g = copy.copy(network_list_2g) if len(network_list_5g) > 1: self.config_5g = self._generate_legacy_ap_config( network_list_5g) if len(network_list_2g) > 1: self.config_2g = self._generate_legacy_ap_config( network_list_2g) self.access_points[count].start_ap(self.config_2g) self.access_points[count].start_ap(self.config_5g) self.populate_bssid(count, self.access_points[count], orig_network_list_5g, orig_network_list_2g) # Repeat configuration on the second router. if mirror_ap and ap_count == 2: self.access_points[AP_2].start_ap(self.config_2g) self.access_points[AP_2].start_ap(self.config_5g) self.populate_bssid(AP_2, self.access_points[AP_2], orig_network_list_5g, orig_network_list_2g) def _kill_processes(self, ap, daemon): """ Kill hostapd and dhcpd daemons Args: ap: AP to cleanup daemon: process to kill Returns: True/False if killing process is successful """ self.log.info("Killing %s" % daemon) pids = ap.ssh.run('pidof %s' % daemon, ignore_status=True) if pids.stdout: ap.ssh.run('kill %s' % pids.stdout, ignore_status=True) time.sleep(3) pids = ap.ssh.run('pidof %s' % daemon, ignore_status=True) if pids.stdout: return False return True def _cleanup_hostapd_and_dhcpd(self, count): """ Check if AP was cleaned up properly Kill hostapd and dhcpd processes if cleanup was not successful in the last run Args: count: AP to check Returns: New AccessPoint object if AP required cleanup Raises: Error: if the AccessPoint timed out to setup """ ap = self.access_points[count] phy_ifaces = ap.interfaces.get_physical_interface() kill_hostapd = False for iface in phy_ifaces: if '2g_' in iface or '5g_' in iface or 'xg_' in iface: kill_hostapd = True break if not kill_hostapd: return self.log.debug("Cleanup AP") if not self._kill_processes(ap, 'hostapd') or \ not self._kill_processes(ap, 'dhcpd'): raise ("Failed to cleanup AP") ap.__init__(self.user_params['AccessPoint'][count]) def _generate_legacy_ap_config(self, network_list): bss_settings = [] wlan_2g = self.access_points[AP_1].wlan_2g wlan_5g = self.access_points[AP_1].wlan_5g ap_settings = network_list.pop(0) # TODO:(bmahadev) This is a bug. We should not have to pop the first # network in the list and treat it as a separate case. Instead, # create_ap_preset() should be able to take NULL ssid and security and # build config based on the bss_Settings alone. hostapd_config_settings = network_list.pop(0) for network in network_list: if "password" in network: bss_settings.append( hostapd_bss_settings.BssSettings( name=network["SSID"], ssid=network["SSID"], hidden=network["hiddenSSID"], security=hostapd_security.Security( security_mode=network["security"], password=network["password"]))) elif "wepKeys" in network: bss_settings.append( hostapd_bss_settings.BssSettings( name=network["SSID"], ssid=network["SSID"], hidden=network["hiddenSSID"], security=hostapd_security.Security( security_mode=network["security"], password=network["wepKeys"][0]))) elif network["security"] == hostapd_constants.ENT_STRING: bss_settings.append( hostapd_bss_settings.BssSettings( name=network["SSID"], ssid=network["SSID"], hidden=network["hiddenSSID"], security=hostapd_security.Security( security_mode=network["security"], radius_server_ip=network["radius_server_ip"], radius_server_port=network["radius_server_port"], radius_server_secret=network[ "radius_server_secret"]))) else: bss_settings.append( hostapd_bss_settings.BssSettings( name=network["SSID"], ssid=network["SSID"], hidden=network["hiddenSSID"])) if "password" in hostapd_config_settings: config = hostapd_ap_preset.create_ap_preset( iface_wlan_2g=wlan_2g, iface_wlan_5g=wlan_5g, channel=ap_settings["channel"], ssid=hostapd_config_settings["SSID"], hidden=hostapd_config_settings["hiddenSSID"], security=hostapd_security.Security( security_mode=hostapd_config_settings["security"], password=hostapd_config_settings["password"]), bss_settings=bss_settings) elif "wepKeys" in hostapd_config_settings: config = hostapd_ap_preset.create_ap_preset( iface_wlan_2g=wlan_2g, iface_wlan_5g=wlan_5g, channel=ap_settings["channel"], ssid=hostapd_config_settings["SSID"], hidden=hostapd_config_settings["hiddenSSID"], security=hostapd_security.Security( security_mode=hostapd_config_settings["security"], password=hostapd_config_settings["wepKeys"][0]), bss_settings=bss_settings) else: config = hostapd_ap_preset.create_ap_preset( iface_wlan_2g=wlan_2g, iface_wlan_5g=wlan_5g, channel=ap_settings["channel"], ssid=hostapd_config_settings["SSID"], hidden=hostapd_config_settings["hiddenSSID"], bss_settings=bss_settings) return config def configure_packet_capture( self, channel_5g=hostapd_constants.AP_DEFAULT_CHANNEL_5G, channel_2g=hostapd_constants.AP_DEFAULT_CHANNEL_2G): """Configure packet capture for 2G and 5G bands. Args: channel_5g: Channel to set the monitor mode to for 5G band. channel_2g: Channel to set the monitor mode to for 2G band. """ self.packet_capture = self.packet_capture[0] result = self.packet_capture.configure_monitor_mode( hostapd_constants.BAND_2G, channel_2g) if not result: raise ValueError("Failed to configure channel for 2G band") result = self.packet_capture.configure_monitor_mode( hostapd_constants.BAND_5G, channel_5g) if not result: raise ValueError("Failed to configure channel for 5G band.") @staticmethod def wifi_test_wrap(fn): def _safe_wrap_test_case(self, *args, **kwargs): test_id = "%s:%s:%s" % (self.__class__.__name__, self.test_name, self.log_begin_time.replace(' ', '-')) self.test_id = test_id self.result_detail = "" tries = int(self.user_params.get("wifi_auto_rerun", 3)) for ad in self.android_devices: ad.log_path = self.log_path for i in range(tries + 1): result = True if i > 0: log_string = "[Test Case] RETRY:%s %s" % (i, self.test_name) self.log.info(log_string) self._teardown_test(self.test_name) self._setup_test(self.test_name) try: result = fn(self, *args, **kwargs) except signals.TestFailure as e: self.log.warn("Error msg: %s" % e) if self.result_detail: signal.details = self.result_detail result = False except signals.TestSignal: if self.result_detail: signal.details = self.result_detail raise except Exception as e: self.log.exception(e) asserts.fail(self.result_detail) if result is False: if i < tries: continue else: break if result is not False: asserts.explicit_pass(self.result_detail) else: asserts.fail(self.result_detail) return _safe_wrap_test_case