Loading packages/SystemUI/tests/src/com/android/keyguard/KeyguardUpdateMonitorTest.java +6 −0 Original line number Diff line number Diff line Loading @@ -103,6 +103,7 @@ import android.os.PowerManager; import android.os.RemoteException; import android.os.UserHandle; import android.os.UserManager; import android.platform.test.annotations.EnableFlags; import android.platform.test.flag.junit.FlagsParameterization; import android.service.dreams.IDreamManager; import android.service.trust.TrustAgentService; Loading @@ -129,6 +130,7 @@ import com.android.keyguard.KeyguardUpdateMonitor.BiometricAuthenticated; import com.android.keyguard.logging.KeyguardUpdateMonitorLogger; import com.android.keyguard.logging.SimLogger; import com.android.settingslib.fuelgauge.BatteryStatus; import com.android.systemui.Flags; import com.android.systemui.SysuiTestCase; import com.android.systemui.biometrics.AuthController; import com.android.systemui.biometrics.FingerprintInteractiveToAuthProvider; Loading Loading @@ -190,6 +192,7 @@ import platform.test.runner.parameterized.Parameters; @SmallTest @RunWith(ParameterizedAndroidJunit4.class) @TestableLooper.RunWithLooper @EnableFlags(Flags.FLAG_USER_ENCRYPTED_SOURCE) public class KeyguardUpdateMonitorTest extends SysuiTestCase { private static final String PKG_ALLOWING_FP_LISTEN_ON_OCCLUDING_ACTIVITY = "test_app_fp_listen_on_occluding_activity"; Loading Loading @@ -1292,12 +1295,15 @@ public class KeyguardUpdateMonitorTest extends SysuiTestCase { @Test public void testIsUserUnlocked() { when(mUserManager.isUserUnlocked(mSelectedUserInteractor.getSelectedUserId())).thenReturn( true); // mUserManager will report the user as unlocked on @Before assertThat( mKeyguardUpdateMonitor.isUserUnlocked(mSelectedUserInteractor.getSelectedUserId())) .isTrue(); // Invalid user should not be unlocked. int randomUser = 99; when(mUserManager.isUserUnlocked(randomUser)).thenReturn(false); assertThat(mKeyguardUpdateMonitor.isUserUnlocked(randomUser)).isFalse(); } Loading Loading
packages/SystemUI/tests/src/com/android/keyguard/KeyguardUpdateMonitorTest.java +6 −0 Original line number Diff line number Diff line Loading @@ -103,6 +103,7 @@ import android.os.PowerManager; import android.os.RemoteException; import android.os.UserHandle; import android.os.UserManager; import android.platform.test.annotations.EnableFlags; import android.platform.test.flag.junit.FlagsParameterization; import android.service.dreams.IDreamManager; import android.service.trust.TrustAgentService; Loading @@ -129,6 +130,7 @@ import com.android.keyguard.KeyguardUpdateMonitor.BiometricAuthenticated; import com.android.keyguard.logging.KeyguardUpdateMonitorLogger; import com.android.keyguard.logging.SimLogger; import com.android.settingslib.fuelgauge.BatteryStatus; import com.android.systemui.Flags; import com.android.systemui.SysuiTestCase; import com.android.systemui.biometrics.AuthController; import com.android.systemui.biometrics.FingerprintInteractiveToAuthProvider; Loading Loading @@ -190,6 +192,7 @@ import platform.test.runner.parameterized.Parameters; @SmallTest @RunWith(ParameterizedAndroidJunit4.class) @TestableLooper.RunWithLooper @EnableFlags(Flags.FLAG_USER_ENCRYPTED_SOURCE) public class KeyguardUpdateMonitorTest extends SysuiTestCase { private static final String PKG_ALLOWING_FP_LISTEN_ON_OCCLUDING_ACTIVITY = "test_app_fp_listen_on_occluding_activity"; Loading Loading @@ -1292,12 +1295,15 @@ public class KeyguardUpdateMonitorTest extends SysuiTestCase { @Test public void testIsUserUnlocked() { when(mUserManager.isUserUnlocked(mSelectedUserInteractor.getSelectedUserId())).thenReturn( true); // mUserManager will report the user as unlocked on @Before assertThat( mKeyguardUpdateMonitor.isUserUnlocked(mSelectedUserInteractor.getSelectedUserId())) .isTrue(); // Invalid user should not be unlocked. int randomUser = 99; when(mUserManager.isUserUnlocked(randomUser)).thenReturn(false); assertThat(mKeyguardUpdateMonitor.isUserUnlocked(randomUser)).isFalse(); } Loading