--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using System;
+using NUnit.Framework;
+using Xamarin.Forms;
+
+namespace XamarinApplication.Tizen
+{
+ class Program : global::Xamarin.Forms.Platform.Tizen.FormsApplication
+ {
+ private Application _app;
+ protected override void OnCreate()
+ {
+ Console.WriteLine("TCT : OnCreate()");
+ base.OnCreate();
+ if (ManualTest.IsWearable())
+ {
+ _app = new WearableTemplate.MainPage();
+ }
+ else
+ {
+ _app = new ManualTemplate.MainPage();
+ }
+ LoadApplication(_app);
+ }
+
+ static void Main(string[] args)
+ {
+ Console.WriteLine("TCT : Main()");
+ var app = new Program();
+ global::Xamarin.Forms.Platform.Tizen.Forms.Init(app);
+ app.Run(args);
+ }
+ }
+}
--- /dev/null
+<Project Sdk="Microsoft.NET.Sdk">
+
+ <!-- Property Group for .NET Core Project -->
+ <PropertyGroup>
+ <OutputType>Exe</OutputType>
+ <TargetFramework>tizen60</TargetFramework>
+ </PropertyGroup>
+
+ <!-- Property Group for Tizen Project -->
+ <PropertyGroup>
+ <TizenCreateTpkOnBuild>true</TizenCreateTpkOnBuild>
+ </PropertyGroup>
+
+ <PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'Debug|AnyCPU' ">
+ <DebugType>portable</DebugType>
+ </PropertyGroup>
+ <PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'Release|AnyCPU' ">
+ <DebugType>None</DebugType>
+ </PropertyGroup>
+
+ <ItemGroup>
+ <Folder Include="lib\" />
+ </ItemGroup>
+
+ <Import Project="..\Common\dependencies.props" />
+
+ <ItemGroup>
+ <PackageReference Include="Tizen.NET" Version="$(TizenNETVersion)">
+ <ExcludeAssets>Runtime</ExcludeAssets>
+ </PackageReference>
+ <PackageReference Include="Tizen.NET.Sdk" Version="$(TizenNETSdkVersion)" />
+ </ItemGroup>
+
+ <!-- Include Nuget Package for Tizen Project building -->
+ <ItemGroup>
+ <ProjectReference Include="..\Template\ManualTemplate\ManualTemplate.csproj" />
+ </ItemGroup>
+ <ItemGroup>\r
+ <Reference Include="Tizen.Security.DevicePolicyManager">\r
+ <HintPath>..\..\..\TizenFX\src\Tizen.Security.DevicePolicyManager\bin\Release\netstandard2.0\Tizen.Security.DevicePolicyManager.dll</HintPath>\r
+ </Reference>\r
+ </ItemGroup>
+
+</Project>
--- /dev/null
+Microsoft Visual Studio Solution File, Format Version 12.00
+# Visual Studio 15
+VisualStudioVersion = 15.0.26730.15
+MinimumVisualStudioVersion = 15.0.26124.0
+Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Tizen.DevicePolicyManager.Manual.Tests", "Tizen.DevicePolicyManager.Manual.Tests.csproj", "{D92BEEAC-3B2A-45F8-8C53-53B92550404A}"
+EndProject
+Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "nunit.framework", "..\nunit.framework\nunit.framework.csproj", "{B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}"
+EndProject
+Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "nunitlite", "..\nunitlite\nunitlite.csproj", "{FDB8025A-C029-461F-895E-287B4C65939B}"
+EndProject
+Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "ManualTemplate", "..\Template\ManualTemplate\ManualTemplate.csproj", "{269F89A7-E648-4811-8421-844E00ACF5F0}"
+EndProject
+Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "ManualTemplateForWearable", "..\Template\ManualTemplateForWearable\ManualTemplateForWearable.csproj", "{D36CED01-29BD-4EB3-8903-62E0BF2A822D}"
+EndProject
+Global
+ GlobalSection(SolutionConfigurationPlatforms) = preSolution
+ Debug|Any CPU = Debug|Any CPU
+ Debug|x64 = Debug|x64
+ Debug|x86 = Debug|x86
+ Release|Any CPU = Release|Any CPU
+ Release|x64 = Release|x64
+ Release|x86 = Release|x86
+ EndGlobalSection
+ GlobalSection(ProjectConfigurationPlatforms) = postSolution
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Debug|x64.ActiveCfg = Debug|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Debug|x64.Build.0 = Debug|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Debug|x86.ActiveCfg = Debug|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Debug|x86.Build.0 = Debug|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Release|Any CPU.ActiveCfg = Release|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Release|Any CPU.Build.0 = Release|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Release|x64.ActiveCfg = Release|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Release|x64.Build.0 = Release|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Release|x86.ActiveCfg = Release|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Release|x86.Build.0 = Release|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Debug|x64.ActiveCfg = Debug|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Debug|x64.Build.0 = Debug|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Debug|x86.ActiveCfg = Debug|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Debug|x86.Build.0 = Debug|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Release|Any CPU.ActiveCfg = Release|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Release|Any CPU.Build.0 = Release|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Release|x64.ActiveCfg = Release|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Release|x64.Build.0 = Release|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Release|x86.ActiveCfg = Release|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Release|x86.Build.0 = Release|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Debug|x64.ActiveCfg = Debug|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Debug|x64.Build.0 = Debug|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Debug|x86.ActiveCfg = Debug|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Debug|x86.Build.0 = Debug|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Release|Any CPU.ActiveCfg = Release|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Release|Any CPU.Build.0 = Release|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Release|x64.ActiveCfg = Release|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Release|x64.Build.0 = Release|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Release|x86.ActiveCfg = Release|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Release|x86.Build.0 = Release|Any CPU
+ {D36CED01-29BD-4EB3-8903-62E0BF2A822D}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {D36CED01-29BD-4EB3-8903-62E0BF2A822D}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {D36CED01-29BD-4EB3-8903-62E0BF2A822D}.NUI|Any CPU.ActiveCfg = Debug|Any CPU
+ {D36CED01-29BD-4EB3-8903-62E0BF2A822D}.NUI|Any CPU.Build.0 = Debug|Any CPU
+ {D36CED01-29BD-4EB3-8903-62E0BF2A822D}.Release|Any CPU.ActiveCfg = Release|Any CPU
+ {D36CED01-29BD-4EB3-8903-62E0BF2A822D}.Release|Any CPU.Build.0 = Release|Any CPU
+ {269F89A7-E648-4811-8421-844E00ACF5F0}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {269F89A7-E648-4811-8421-844E00ACF5F0}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {269F89A7-E648-4811-8421-844E00ACF5F0}.NUI|Any CPU.ActiveCfg = Debug|Any CPU
+ {269F89A7-E648-4811-8421-844E00ACF5F0}.NUI|Any CPU.Build.0 = Debug|Any CPU
+ {269F89A7-E648-4811-8421-844E00ACF5F0}.Release|Any CPU.ActiveCfg = Release|Any CPU
+ {269F89A7-E648-4811-8421-844E00ACF5F0}.Release|Any CPU.Build.0 = Release|Any CPU
+ EndGlobalSection
+ GlobalSection(SolutionProperties) = preSolution
+ HideSolutionNode = FALSE
+ EndGlobalSection
+ GlobalSection(ExtensibilityGlobals) = postSolution
+ SolutionGuid = {ED382B91-9930-40B6-B3D7-362304C78680}
+ EndGlobalSection
+EndGlobal
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using System.Threading.Tasks;
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Manual.Tests
+{
+ [TestFixture]
+ [Description("Manual Tests Tizen.Security.DevicePolicyManager.BluetoothPolicy class")]
+ public class BluetoothPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private BluetoothPolicy _bluetoothPolicy;
+ private string _currentPolicyName;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _bluetoothPolicy = _dpm.GetPolicy<BluetoothPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _bluetoothPolicy, _dpm");
+ _bluetoothPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether BluetoothPolicyChanged is callable.")]
+ [Property("SPEC", " Tizen.Security.DevicePolicyManager.BluetoothPolicy.BluetoothPolicyChanged E")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "EVL")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.bluetooth string:\"allowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task BluetoothPolicyChanged_CHECK_EVENT()
+ {
+ _currentPolicyName = BluetoothPolicy.BluetoothPolicyName;
+ _bluetoothPolicy.BluetoothPolicyChanged += TestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added BluetoothPolicyChanged event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.bluetooth string:"allowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed BluetoothPolicyChanged event");
+ _bluetoothPolicy.BluetoothPolicyChanged -= TestCallback;
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether BluetoothTetheringPolicyChanged is callable.")]
+ [Property("SPEC", " Tizen.Security.DevicePolicyManager.BluetoothPolicy.BluetoothTetheringPolicyChanged E")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "EVL")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.bluetooth_tethering string:\"allowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task BluetoothTetheringPolicyChanged_CHECK_EVENT()
+ {
+ _currentPolicyName = BluetoothPolicy.BluetoothTetheringPolicyName;
+ _bluetoothPolicy.BluetoothTetheringPolicyChanged += TestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added BluetoothTetheringPolicyChanged event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.bluetooth_tethering string:"allowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed BluetoothTetheringPolicyChanged event");
+ _bluetoothPolicy.BluetoothTetheringPolicyChanged -= TestCallback;
+ }
+
+ void TestCallback(Object Sender, PolicyChangedEventArgs args)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "[EventHandler]PolicyName: " + args.PolicyName + " State: " + args.IsAllowed);
+ if (args.PolicyName == _currentPolicyName && args.IsAllowed == true)
+ {
+ ManualTest.Confirm();
+ }
+ else
+ {
+ ManualTest.ConfirmFail("It's not expected result. PolicyName:" + args.PolicyName + ", State:" + args.IsAllowed);
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using System.Threading.Tasks;
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Manual.Tests
+{
+ [TestFixture]
+ [Description("Manual Tests Tizen.Security.DevicePolicyManager.BrowserPolicy class")]
+ public class BrowserPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private BrowserPolicy _browserPolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _browserPolicy = _dpm.GetPolicy<BrowserPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _browserPolicy, _dpm");
+ _browserPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether BrowserPolicyChanged is callable.")]
+ [Property("SPEC", " Tizen.Security.DevicePolicyManager.BrowserPolicy.BrowserPolicyChanged E")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "EVL")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.browser string:\"allowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task BrowserPolicyChanged_CHECK_EVENT()
+ {
+ _browserPolicy.BrowserPolicyChanged += TestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added BrowserPolicyChanged event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.browser string:"allowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed BrowserPolicyChanged event");
+ _browserPolicy.BrowserPolicyChanged -= TestCallback;
+ }
+
+ void TestCallback(Object Sender, PolicyChangedEventArgs args)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "[EventHandler]PolicyName: " + args.PolicyName + " State: " + args.IsAllowed);
+ if (args.PolicyName == BrowserPolicy.BrowserPolicyName && args.IsAllowed == true)
+ {
+ ManualTest.Confirm();
+ }
+ else
+ {
+ ManualTest.ConfirmFail("It's not expected result. PolicyName:" + args.PolicyName + ", State:" + args.IsAllowed);
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using System.Threading.Tasks;
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Manual.Tests
+{
+ [TestFixture]
+ [Description("Manual Tests Tizen.Security.DevicePolicyManager.EmailPolicy class")]
+ public class EmailPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private EmailPolicy _emailPolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _emailPolicy = _dpm.GetPolicy<EmailPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _emailPolicy, _dpm");
+ _emailPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether PopImapPolicyChanged is callable.")]
+ [Property("SPEC", " Tizen.Security.DevicePolicyManager.EmailPolicy.PopImapPolicyChanged E")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "EVL")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.popimap_email string:\"allowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task PopImapPolicyChanged_CHECK_EVENT()
+ {
+ _emailPolicy.PopImapPolicyChanged += TestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.popimap_email string:"allowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed event");
+ _emailPolicy.PopImapPolicyChanged -= TestCallback;
+ }
+
+ void TestCallback(Object Sender, PolicyChangedEventArgs args)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "[EventHandler]PolicyName: " + args.PolicyName + " State: " + args.IsAllowed);
+ if (args.PolicyName == EmailPolicy.PopImapEmailPolicyName && args.IsAllowed == true)
+ {
+ ManualTest.Confirm();
+ }
+ else
+ {
+ ManualTest.ConfirmFail("It's not expected result. PolicyName:" + args.PolicyName + ", State:" + args.IsAllowed);
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using System.Threading.Tasks;
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Manual.Tests
+{
+ [TestFixture]
+ [Description("Manual Tests Tizen.Security.DevicePolicyManager.LocationPolicy class")]
+ public class LocationPolicyTests
+ {
+ static internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private LocationPolicy _locationPolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _locationPolicy = _dpm.GetPolicy<LocationPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _locationPolicy, _dpm");
+ _locationPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether LocationPolicyChanged is callable.")]
+ [Property("SPEC", " Tizen.Security.DevicePolicyManager.LocationPolicy.LocationPolicyChanged E")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "EVL")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.location string:\"allowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task LocationPolicyChanged_CHECK_EVENT()
+ {
+ _locationPolicy.LocationPolicyChanged += TestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added LocationPolicyChanged event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.location string:"allowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed LocationPolicyChanged event");
+ _locationPolicy.LocationPolicyChanged -= TestCallback;
+ }
+
+ void TestCallback(Object Sender, PolicyChangedEventArgs args)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "[EventHandler]PolicyName: " + args.PolicyName + " State: " + args.IsAllowed);
+ if (args.PolicyName == LocationPolicy.LocationPolicyName && args.IsAllowed == true)
+ {
+ ManualTest.Confirm();
+ }
+ else
+ {
+ ManualTest.ConfirmFail("It's not expected result. PolicyName:" + args.PolicyName + ", State:" + args.IsAllowed);
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using System.Threading.Tasks;
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Manual.Tests
+{
+ [TestFixture]
+ [Description("Manual Tests Tizen.Security.DevicePolicyManager.MediaPolicy class")]
+ public class MediaPolicyTests
+ {
+ static internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private MediaPolicy _mediaPolicy;
+ private string _currentPolicyName;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _mediaPolicy = _dpm.GetPolicy<MediaPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _mediaPolicy, _dpm");
+ _mediaPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether CameraPolicyChanged is callable.")]
+ [Property("SPEC", " Tizen.Security.DevicePolicyManager.MediaPolicy.CameraPolicyChanged E")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "EVL")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.camera string:\"allowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task CameraPolicyChanged_CHECK_EVENT()
+ {
+ _currentPolicyName = MediaPolicy.CameraPolicyName;
+ _mediaPolicy.CameraPolicyChanged += TestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added CameraPolicyChanged event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.camera string:"allowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed CameraPolicyChanged event");
+ _mediaPolicy.CameraPolicyChanged -= TestCallback;
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether MicrophonePolicyChanged is callable.")]
+ [Property("SPEC", " Tizen.Security.DevicePolicyManager.MediaPolicy.MicrophonePolicyChanged E")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "EVL")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal to view logs.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.microphone string:\"allowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task MicrophonePolicyChanged_CHECK_EVENT()
+ {
+ _currentPolicyName = MediaPolicy.MicrophonePolicyName;
+ _mediaPolicy.MicrophonePolicyChanged += TestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added MicrophonePolicyChanged event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.microphone string:"allowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed MicrophonePolicyChanged event");
+ _mediaPolicy.MicrophonePolicyChanged -= TestCallback;
+ }
+
+ void TestCallback(Object Sender, PolicyChangedEventArgs args)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "[EventHandler]PolicyName: " + args.PolicyName + " State: " + args.IsAllowed);
+ if (args.PolicyName == _currentPolicyName && args.IsAllowed == true)
+ {
+ ManualTest.Confirm();
+ }
+ else
+ {
+ ManualTest.ConfirmFail("It's not expected result. PolicyName:" + args.PolicyName + ", State:" + args.IsAllowed);
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using System.Threading.Tasks;
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Manual.Tests
+{
+
+ [TestFixture]
+ [Description("Manual Tests Tizen.Security.DevicePolicyManager.PolicyChangedEventArgs class")]
+ public class PolicyChangedEventArgsTests
+ {
+ static internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private BluetoothPolicy _bluetoothPolicy;
+ private bool _isSupported;
+
+ private readonly string _testPollicyName = BluetoothPolicy.BluetoothPolicyName;
+ private bool _testStatus;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _bluetoothPolicy = _dpm.GetPolicy<BluetoothPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _bluetoothPolicy, _dpm.");
+ _bluetoothPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether PolicyName returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.PolicyChangedEventArgs.PolicyName A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. \n>sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.bluetooth string:\"allowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task PolicyName_READ_ONLY()
+ {
+ _bluetoothPolicy.BluetoothPolicyChanged += PolicyNameTestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added BluetoothPolicyChanged event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.bluetooth string:"allowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed BluetoothPolicyChanged event");
+ _bluetoothPolicy.BluetoothPolicyChanged -= PolicyNameTestCallback;
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether IsAllowed returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.PolicyChangedEventArgs.IsAllowed A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. \n>sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.bluetooth string:\"allowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task IsAllowed_READ_ONLY_TRUE()
+ {
+ _testStatus = true;
+ _bluetoothPolicy.BluetoothPolicyChanged += IsAllowedTestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added BluetoothPolicyChanged event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.bluetooth string:"allowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed BluetoothPolicyChanged event");
+ _bluetoothPolicy.BluetoothPolicyChanged -= IsAllowedTestCallback;
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether IsAllowed returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.PolicyChangedEventArgs.IsAllowed A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. \n>sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.bluetooth string:\"disallowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task IsAllowed_READ_ONLY_FALSE()
+ {
+ _testStatus = false;
+ _bluetoothPolicy.BluetoothPolicyChanged += IsAllowedTestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added BluetoothPolicyChanged event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.bluetooth_tethering string:"disallowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed BluetoothPolicyChanged event");
+ _bluetoothPolicy.BluetoothPolicyChanged -= IsAllowedTestCallback;
+ }
+
+ void PolicyNameTestCallback(Object Sender, PolicyChangedEventArgs args)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "[EventHandler]PolicyName: " + args.PolicyName + " State: " + args.IsAllowed);
+ if (args.PolicyName == _testPollicyName)
+ {
+ ManualTest.Confirm();
+ }
+ else
+ {
+ ManualTest.ConfirmFail("It's not expected result. PolicyName:" + args.PolicyName + ", State:" + args.IsAllowed);
+ }
+ }
+
+ void IsAllowedTestCallback(Object Sender, PolicyChangedEventArgs args)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "[EventHandler]PolicyName: " + args.PolicyName + " State: " + args.IsAllowed);
+ if (args.IsAllowed == _testStatus)
+ {
+ ManualTest.Confirm();
+ }
+ else
+ {
+ ManualTest.ConfirmFail("It's not expected result. PolicyName:" + args.PolicyName + ", State:" + args.IsAllowed);
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using System.Threading.Tasks;
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Manual.Tests
+{
+ [TestFixture]
+ [Description("Manual Tests Tizen.Security.DevicePolicyManager.StoragePolicy class")]
+ public class StoragePolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private StoragePolicy _storagePolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _storagePolicy = _dpm.GetPolicy<StoragePolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _storagePolicy, _dpm");
+ _storagePolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether ExternalStoragePolicyChanged is callable.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.StoragePolicy.ExternalStoragePolicyChanged E")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "EVL")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.external_storage string:\"allowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task ExternalStoragePolicyChanged_CHECK_EVENT()
+ {
+ _storagePolicy.ExternalStoragePolicyChanged += TestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added ExternalStoragePolicyChanged event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.location string:"allowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed ExternalStoragePolicyChanged event");
+ _storagePolicy.ExternalStoragePolicyChanged -= TestCallback;
+ }
+
+ void TestCallback(Object Sender, PolicyChangedEventArgs args)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "[EventHandler]PolicyName: " + args.PolicyName + " State: " + args.IsAllowed);
+ if (args.PolicyName == StoragePolicy.ExternalStoragePolicyName && args.IsAllowed == true)
+ {
+ ManualTest.Confirm();
+ }
+ else
+ {
+ ManualTest.ConfirmFail("It's not expected result. PolicyName:" + args.PolicyName + ", State:" + args.IsAllowed);
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using System.Threading.Tasks;
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Manual.Tests
+{
+ [TestFixture]
+ [Description("Manual Tests Tizen.Security.DevicePolicyManager.TelephonyPolicy class")]
+ public class TelephonyPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private TelephonyPolicy _telephonyPolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _telephonyPolicy = _dpm.GetPolicy<TelephonyPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _telephonyPolicy, _dpm");
+ _telephonyPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether MessagingPolicyChanged is callable.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.TelephonyPolicy.MessagingPolicyChanged E")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "EVL")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal to view logs.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.messaging string:\"allowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task MessagingPolicyChanged_CHECK_EVENT()
+ {
+ _telephonyPolicy.MessagingPolicyChanged += TestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added MessagingPolicyChanged event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.messaging string:"allowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed MessagingPolicyChanged event");
+ _telephonyPolicy.MessagingPolicyChanged -= TestCallback;
+ }
+
+ void TestCallback(Object Sender, PolicyChangedEventArgs args)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "[EventHandler]PolicyName: " + args.PolicyName + " State: " + args.IsAllowed);
+ if (args.PolicyName == TelephonyPolicy.MessagingPolicyName && args.IsAllowed == true)
+ {
+ ManualTest.Confirm();
+ }
+ else
+ {
+ ManualTest.ConfirmFail("It's not expected result. PolicyName:" + args.PolicyName + ", State:" + args.IsAllowed);
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using System.Threading.Tasks;
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Manual.Tests
+{
+ [TestFixture]
+ [Description("Manual Tests Tizen.Security.DevicePolicyManager.UsbPolicy class")]
+ public class UsbPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private UsbPolicy _usbPolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _usbPolicy = _dpm.GetPolicy<UsbPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _usbPolicy, _dpm");
+ _usbPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether UsbTetheringPolicyChanged is callable.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.UsbPolicy.UsbTetheringPolicyChanged E")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "EVL")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal to view logs.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.usb_tethering string:\"allowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task UsbTetheringPolicyChanged_CHECK_EVENT()
+ {
+ _usbPolicy.UsbTetheringPolicyChanged += TestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added UsbTetheringPolicyChanged event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.usb_tethering string:"allowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed UsbTetheringPolicyChanged event");
+ _usbPolicy.UsbTetheringPolicyChanged -= TestCallback;
+ }
+
+ void TestCallback(Object Sender, PolicyChangedEventArgs args)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "[EventHandler]PolicyName: " + args.PolicyName + " State: " + args.IsAllowed);
+ if (args.PolicyName == UsbPolicy.UsbTetheringPolicyName && args.IsAllowed == true)
+ {
+ ManualTest.Confirm();
+ }
+ else
+ {
+ ManualTest.ConfirmFail("It's not expected result. PolicyName:" + args.PolicyName + ", State:" + args.IsAllowed);
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using System.Threading.Tasks;
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Manual.Tests
+{
+ [TestFixture]
+ [Description("Manual Tests Tizen.Security.DevicePolicyManager.WifiPolicy class")]
+ public class WifiPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private WifiPolicy _wifiPolicy;
+ private string _currentPolicyName;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _wifiPolicy = _dpm.GetPolicy<WifiPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _wifiPolicy, _dpm");
+ _wifiPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether WifiPolicyChanged is callable.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.WifiPolicy.WifiPolicyChanged E")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "EVL")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal to view logs.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.wifi string:\"allowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task WifiPolicyChanged_CHECK_EVENT()
+ {
+ _currentPolicyName = WifiPolicy.WifiPolicyName;
+ _wifiPolicy.WifiPolicyChanged += TestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added WifiPolicyChanged event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.wifi string:"allowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed WifiPolicyChanged event");
+ _wifiPolicy.WifiPolicyChanged -= TestCallback;
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("MANUAL TEST : Check whether WifiHotspotPolicyChanged is callable.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.WifiPolicy.WifiHotspotPolicyChanged E")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "EVL")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ [Precondition(1, "Open terminal to view logs.")]
+ [Precondition(2, "Enter command \"sdb root on\"")]
+ [Step(1, "Click run TC")]
+ [Step(2, "Insert next command. sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.wifi_hotspot string:\"allowed\"")]
+ [Postcondition(1, "Close the terminal")]
+ public async Task WifiHotspotPolicyChanged_CHECK_EVENT()
+ {
+ _currentPolicyName = WifiPolicy.WifiHotspotPolicyName;
+ _wifiPolicy.WifiHotspotPolicyChanged += TestCallback;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Added WifiHotspotPolicyChanged event");
+
+ /*
+ * TEST CODE - MANUAL TEST
+ * use command: sdb shell dbus-send --system /org/tizen/DevicePolicyManger/PIL org.tizen.DevicePolicyManager.PIL.Event.wifi_hotspot string:"allowed" to raise event.
+ */
+ await ManualTest.WaitForConfirm();
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Removed WifiHotspotPolicyChanged event");
+ _wifiPolicy.WifiHotspotPolicyChanged -= TestCallback;
+ }
+
+ void TestCallback(Object Sender, PolicyChangedEventArgs args)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "[EventHandler]PolicyName: " + args.PolicyName + " State: " + args.IsAllowed);
+ if (args.PolicyName == _currentPolicyName && args.IsAllowed == true)
+ {
+ ManualTest.Confirm();
+ }
+ else
+ {
+ ManualTest.ConfirmFail("It's not expected result. PolicyName:" + args.PolicyName + ", State:" + args.IsAllowed);
+ }
+ }
+ }
+}
--- /dev/null
+<?xml version="1.0" encoding="utf-8"?>
+<manifest xmlns="http://tizen.org/ns/packages" api-version="6" package="Tizen.DevicePolicyManager.Manual.Tests" version="1.0.0">
+ <profile name="common" />
+ <ui-application appid="Tizen.DevicePolicyManager.Manual.Tests"
+ exec="Tizen.DevicePolicyManager.Manual.Tests.dll"
+ type="dotnet"
+ multiple="false"
+ taskmanage="true"
+ launch_mode="single">
+ <icon>Tizen.DevicePolicyManager.Manual.Tests.png</icon>
+ <label>Tizen.DevicePolicyManager.Manual.Tests</label>
+ </ui-application>
+ <privileges>
+ <privilege>http://tizen.org/privilege/appmanager.launch</privilege>
+ </privileges>
+</manifest>
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using System;
+using NUnitLite.TUnit;
+using AutoTemplate;
+
+namespace XamarinForTizen.Tizen
+{
+
+ class Program : global::Xamarin.Forms.Platform.Tizen.FormsApplication
+ {
+ private static App _app;
+ protected override void OnCreate()
+ {
+ base.OnCreate();
+
+ Console.WriteLine("TCT : OnCreate()");
+ _app = new App();
+ LoadApplication(_app);
+
+ TRunner t = new TRunner();
+ t.LoadTestsuite();
+ t.Execute();
+ }
+
+ public static App getApp()
+ {
+ return _app;
+ }
+ static void Main(string[] args)
+ {
+ Console.WriteLine("TCT : Main()");
+ var app = new Program();
+ global::Xamarin.Forms.Platform.Tizen.Forms.Init(app);
+ app.Run(args);
+ }
+ }
+}
--- /dev/null
+<Project Sdk="Microsoft.NET.Sdk">
+
+ <!-- Property Group for .NET Core Project -->
+ <PropertyGroup>
+ <OutputType>Exe</OutputType>
+ <TargetFramework>tizen60</TargetFramework>
+ </PropertyGroup>
+
+ <!-- Property Group for Tizen Project -->
+ <PropertyGroup>
+ <TizenCreateTpkOnBuild>true</TizenCreateTpkOnBuild>
+ </PropertyGroup>
+
+ <PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'Debug|AnyCPU' ">
+ <DebugType>portable</DebugType>
+ </PropertyGroup>
+ <PropertyGroup Condition=" '$(Configuration)|$(Platform)' == 'Release|AnyCPU' ">
+ <DebugType>None</DebugType>
+ </PropertyGroup>
+ <ItemGroup>\r
+ <Compile Remove="testcase\TSSample.cs" />\r
+ </ItemGroup>
+
+ <ItemGroup>
+ <Folder Include="lib\" />
+ </ItemGroup>
+
+ <Import Project="..\Common\dependencies.props" />
+
+ <ItemGroup>
+ <PackageReference Include="Tizen.NET" Version="$(TizenNETVersion)">
+ <ExcludeAssets>Runtime</ExcludeAssets>
+ </PackageReference>
+ <PackageReference Include="Tizen.NET.Sdk" Version="$(TizenNETSdkVersion)" />
+ </ItemGroup>
+
+ <!-- Include Nuget Package for Tizen Project building -->
+ <ItemGroup>
+ <ProjectReference Include="..\Template\AutoTemplate\AutoTemplate.csproj" />
+ </ItemGroup>
+ <ItemGroup>\r
+ <Reference Include="Tizen.Security.DevicePolicyManager">\r
+ <HintPath>..\..\..\TizenFX\src\Tizen.Security.DevicePolicyManager\bin\Release\netstandard2.0\Tizen.Security.DevicePolicyManager.dll</HintPath>\r
+ </Reference>\r
+ </ItemGroup>
+
+</Project>
--- /dev/null
+Microsoft Visual Studio Solution File, Format Version 12.00
+# Visual Studio 15
+VisualStudioVersion = 15.0.26730.15
+MinimumVisualStudioVersion = 15.0.26124.0
+Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Tizen.DevicePolicyManager.Tests", "Tizen.DevicePolicyManager.Tests.csproj", "{D92BEEAC-3B2A-45F8-8C53-53B92550404A}"
+EndProject
+Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "nunit.framework", "..\nunit.framework\nunit.framework.csproj", "{B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}"
+EndProject
+Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "nunitlite", "..\nunitlite\nunitlite.csproj", "{FDB8025A-C029-461F-895E-287B4C65939B}"
+EndProject
+Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "AutoTemplate", "..\Template\AutoTemplate\AutoTemplate.csproj", "{B11ABB0C-C3C1-4B5C-8251-A15628A775F3}"
+EndProject
+Global
+ GlobalSection(SolutionConfigurationPlatforms) = preSolution
+ Debug|Any CPU = Debug|Any CPU
+ Debug|x64 = Debug|x64
+ Debug|x86 = Debug|x86
+ Release|Any CPU = Release|Any CPU
+ Release|x64 = Release|x64
+ Release|x86 = Release|x86
+ EndGlobalSection
+ GlobalSection(ProjectConfigurationPlatforms) = postSolution
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Debug|x64.ActiveCfg = Debug|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Debug|x64.Build.0 = Debug|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Debug|x86.ActiveCfg = Debug|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Debug|x86.Build.0 = Debug|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Release|Any CPU.ActiveCfg = Release|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Release|Any CPU.Build.0 = Release|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Release|x64.ActiveCfg = Release|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Release|x64.Build.0 = Release|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Release|x86.ActiveCfg = Release|Any CPU
+ {D92BEEAC-3B2A-45F8-8C53-53B92550404A}.Release|x86.Build.0 = Release|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Debug|x64.ActiveCfg = Debug|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Debug|x64.Build.0 = Debug|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Debug|x86.ActiveCfg = Debug|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Debug|x86.Build.0 = Debug|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Release|Any CPU.ActiveCfg = Release|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Release|Any CPU.Build.0 = Release|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Release|x64.ActiveCfg = Release|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Release|x64.Build.0 = Release|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Release|x86.ActiveCfg = Release|Any CPU
+ {B9E7C1FD-CB38-42F7-AC43-7BD2E5B4D216}.Release|x86.Build.0 = Release|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Debug|x64.ActiveCfg = Debug|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Debug|x64.Build.0 = Debug|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Debug|x86.ActiveCfg = Debug|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Debug|x86.Build.0 = Debug|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Release|Any CPU.ActiveCfg = Release|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Release|Any CPU.Build.0 = Release|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Release|x64.ActiveCfg = Release|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Release|x64.Build.0 = Release|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Release|x86.ActiveCfg = Release|Any CPU
+ {FDB8025A-C029-461F-895E-287B4C65939B}.Release|x86.Build.0 = Release|Any CPU
+ {B11ABB0C-C3C1-4B5C-8251-A15628A775F3}.Debug|Any CPU.ActiveCfg = Debug|Any CPU
+ {B11ABB0C-C3C1-4B5C-8251-A15628A775F3}.Debug|Any CPU.Build.0 = Debug|Any CPU
+ {B11ABB0C-C3C1-4B5C-8251-A15628A775F3}.NUI|Any CPU.ActiveCfg = Debug|Any CPU
+ {B11ABB0C-C3C1-4B5C-8251-A15628A775F3}.NUI|Any CPU.Build.0 = Debug|Any CPU
+ {B11ABB0C-C3C1-4B5C-8251-A15628A775F3}.Release|Any CPU.ActiveCfg = Release|Any CPU
+ {B11ABB0C-C3C1-4B5C-8251-A15628A775F3}.Release|Any CPU.Build.0 = Release|Any CPU
+ EndGlobalSection
+ GlobalSection(SolutionProperties) = preSolution
+ HideSolutionNode = FALSE
+ EndGlobalSection
+ GlobalSection(ExtensibilityGlobals) = postSolution
+ SolutionGuid = {ED382B91-9930-40B6-B3D7-362304C78680}
+ EndGlobalSection
+EndGlobal
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Tests
+{
+ [TestFixture]
+ [Description("Tests Tizen.Security.DevicePolicyManager.BluetoothPolicy class")]
+ class BluetoothPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private BluetoothPolicy _bluetoothPolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _bluetoothPolicy = _dpm.GetPolicy<BluetoothPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _bluetoothPolicy, _dpm");
+ _bluetoothPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether BluetoothPolicyName returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.BluetoothPolicy.BluetoothPolicyName A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void BluetoothPolicyName_READ_ONLY()
+ {
+ Assert.IsInstanceOf<string>(BluetoothPolicy.BluetoothPolicyName);
+ Assert.AreEqual(BluetoothPolicy.BluetoothPolicyName, "Bluetooth");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether BluetoothTetheringPolicyName returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.BluetoothPolicy.BluetoothTetheringPolicyName A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void BluetoothTetheringPolicyName_READ_ONLY()
+ {
+ Assert.IsInstanceOf<string>(BluetoothPolicy.BluetoothTetheringPolicyName);
+ Assert.AreEqual(BluetoothPolicy.BluetoothTetheringPolicyName, "BluetoothTethering");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether IsBluetoothAllowed returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.BluetoothPolicy.IsBluetoothAllowed A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void IsBluetoothAllowed_READ_ONLY()
+ {
+ Assert.IsInstanceOf<bool>(_bluetoothPolicy.IsBluetoothAllowed);
+ Assert.True(_bluetoothPolicy.IsBluetoothAllowed, "IsBluetoothAllowed return true");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether IsBluetoothTetheringAllowed returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.BluetoothPolicy.IsBluetoothTetheringAllowed A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void IsBluetoothTetheringAllowed_READ_ONLY()
+ {
+ Assert.IsInstanceOf<bool>(_bluetoothPolicy.IsBluetoothTetheringAllowed);
+ Assert.True(_bluetoothPolicy.IsBluetoothTetheringAllowed, "IsBluetoothTetheringAllowed return true");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether Dispose method not throw exception.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.BluetoothPolicy.Dispose M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MEX")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void Dispose_TEST()
+ {
+ try
+ {
+ DevicePolicyManager dpm = new DevicePolicyManager();
+ BluetoothPolicy bluetoothPolicy = dpm.GetPolicy<BluetoothPolicy>();
+ bluetoothPolicy.Dispose();
+ dpm.Dispose();
+ }
+ catch (Exception e)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, e.Message + " occured");
+ Assert.Fail("Should not throw Exception");
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using System.Linq;
+using System.Threading.Tasks;
+using System.Runtime.InteropServices;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Tests
+{
+ [TestFixture]
+ [Description("Tests Tizen.Security.DevicePolicyManager.BrowserPolicy class")]
+ class BrowserPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private BrowserPolicy _browserPolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _browserPolicy = _dpm.GetPolicy<BrowserPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _browserPolicy, _dpm");
+ _browserPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether BrowserPolicyName returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.BrowserPolicy.BrowserPolicyName A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void BrowserPolicyName_READ_ONLY()
+ {
+ Assert.IsInstanceOf<string>(BrowserPolicy.BrowserPolicyName);
+ Assert.AreEqual(BrowserPolicy.BrowserPolicyName, "Browser");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether IsBrowserAllowed returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.BrowserPolicy.IsBrowserAllowed A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void IsBrowserAllowed_READ_ONLY()
+ {
+ Assert.IsInstanceOf<bool>(_browserPolicy.IsBrowserAllowed);
+ Assert.True(_browserPolicy.IsBrowserAllowed, "IsBrowserAllowed return true");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether Dispose method not throw exception.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.BrowserPolicy.Dispose M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MEX")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void Dispose_TEST()
+ {
+ try
+ {
+ DevicePolicyManager dpm = new DevicePolicyManager();
+ BrowserPolicy browserPolicy = dpm.GetPolicy<BrowserPolicy>();
+ browserPolicy.Dispose();
+ dpm.Dispose();
+ }
+ catch (Exception e)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, e.Message + " occured");
+ Assert.Fail("Should not throw Exception");
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Tests
+{
+ [TestFixture]
+ [Description("Tests Tizen.Security.DevicePolicyManager.DevicePolicyManager class")]
+ public class DevicePolicyManagerTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _dpm");
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P0")]
+ [Description("Create a DevicePolicyManager Instance")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.DevicePolicyManager.DevicePolicyManager C")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "CONSTR")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void DevicePolicyManager_INIT()
+ {
+ var dpm = new DevicePolicyManager();
+ Assert.IsInstanceOf<DevicePolicyManager>(dpm, "Should return DevicePolicyManager instance");
+
+ dpm.Dispose();
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Get a BluetoothPolicy Instance")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.DevicePolicyManager.GetPolicy<T> M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MR")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void GetPolicy_RETURN_VALUE_BLUETHOOTHPOLICY()
+ {
+ var bluetoothPolicy = _dpm.GetPolicy<BluetoothPolicy>();
+ Assert.IsInstanceOf<BluetoothPolicy>(bluetoothPolicy, "Should return BluetoothPolicy instance");
+ bluetoothPolicy.Dispose();
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Get a BrowserPolicy Instance")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.DevicePolicyManager.GetPolicy<T> M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MR")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void GetPolicy_RETURN_VALUE_BROWSERPOLICY()
+ {
+ var browserPolicy = _dpm.GetPolicy<BrowserPolicy>();
+ Assert.IsInstanceOf<BrowserPolicy>(browserPolicy, "Should return BrowserPolicy instance");
+ browserPolicy.Dispose();
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Get a EmailPolicy Instance")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.DevicePolicyManager.GetPolicy<T> M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MR")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void GetPolicy_RETURN_VALUE_EMAILPOLICY()
+ {
+ var emailPolicy = _dpm.GetPolicy<EmailPolicy>();
+ Assert.IsInstanceOf<EmailPolicy>(emailPolicy, "Should return EmailPolicy instance");
+ emailPolicy.Dispose();
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Get a LocationPolicy Instance")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.DevicePolicyManager.GetPolicy<T> M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MR")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void GetPolicy_RETURN_VALUE_LOCATIONPOLICY()
+ {
+ var locationPolicy = _dpm.GetPolicy<LocationPolicy>();
+ Assert.IsInstanceOf<LocationPolicy>(locationPolicy, "Should return LocationPolicy instance");
+ locationPolicy.Dispose();
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Get a MediaPolicy Instance")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.DevicePolicyManager.GetPolicy<T> M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MR")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void GetPolicy_RETURN_VALUE_MEDIAPOLICY()
+ {
+ var mediaPolicy = _dpm.GetPolicy<MediaPolicy>();
+ Assert.IsInstanceOf<MediaPolicy>(mediaPolicy, "Should return MediaPolicy instance");
+ mediaPolicy.Dispose();
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Get a PasswordPolicy Instance")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.DevicePolicyManager.GetPolicy<T> M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MR")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void GetPolicy_RETURN_VALUE_PASSWORDPOLICY()
+ {
+ var passwordPolicy = _dpm.GetPolicy<PasswordPolicy>();
+ Assert.IsInstanceOf<PasswordPolicy>(passwordPolicy, "Should return PasswordPolicy instance");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Get a StoragePolicy Instance")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.DevicePolicyManager.GetPolicy<T> M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MR")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void GetPolicy_RETURN_VALUE_STORAGEPOLICY()
+ {
+ var storagePolicy = _dpm.GetPolicy<StoragePolicy>();
+ Assert.IsInstanceOf<StoragePolicy>(storagePolicy, "Should return StoragePolicy instance");
+ storagePolicy.Dispose();
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Get a TelephonyPolicy Instance")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.DevicePolicyManager.GetPolicy<T> M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MR")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void GetPolicy_RETURN_VALUE_TELEPHONYPOLICY()
+ {
+ var telephonyPolicy = _dpm.GetPolicy<TelephonyPolicy>();
+ Assert.IsInstanceOf<TelephonyPolicy>(telephonyPolicy, "Should return TelephonyPolicy instance");
+ telephonyPolicy.Dispose();
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Get a UsbPolicy Instance")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.DevicePolicyManager.GetPolicy<T> M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MR")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void GetPolicy_RETURN_VALUE_USBPOLICY()
+ {
+ var usbPolicy = _dpm.GetPolicy<UsbPolicy>();
+ Assert.IsInstanceOf<UsbPolicy>(usbPolicy, "Should return UsbPolicy instance");
+ usbPolicy.Dispose();
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Get a WifiPolicy Instance")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.DevicePolicyManager.GetPolicy<T> M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MR")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void GetPolicy_RETURN_VALUE_WIFIPOLICY()
+ {
+ var wifiPolicy = _dpm.GetPolicy<WifiPolicy>();
+ Assert.IsInstanceOf<WifiPolicy>(wifiPolicy, "Should return WifiPolicy instance");
+ wifiPolicy.Dispose();
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether Dispose method not throw exception.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.DevicePolicyManager.Dispose M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MEX")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void Dispose_TEST()
+ {
+ try
+ {
+ DevicePolicyManager dpm = new DevicePolicyManager();
+ dpm.Dispose();
+ }
+ catch (Exception e)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, e.Message + " occured");
+ Assert.Fail("Should not throw Exception");
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Tests
+{
+ [TestFixture]
+ [Description("Tests Tizen.Security.DevicePolicy.EmailPolicy class")]
+ class EmailPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private EmailPolicy _emailPolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _emailPolicy = _dpm.GetPolicy<EmailPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _emailPolicy, _dpm");
+ _emailPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether PopImapEmailPolicyName returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.EmailPolicy.PopImapEmailPolicyName A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void PopImapEmailPolicyName_READ_ONLY()
+ {
+ Assert.IsInstanceOf<string>(EmailPolicy.PopImapEmailPolicyName);
+ Assert.AreEqual(EmailPolicy.PopImapEmailPolicyName, "PopImapEmail");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether IsPopImapAllowed returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.EmailPolicy.IsPopImapAllowed A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void IsPopImapAllowed_READ_ONLY()
+ {
+ Assert.IsInstanceOf<bool>(_emailPolicy.IsPopImapAllowed);
+ Assert.True(_emailPolicy.IsPopImapAllowed, "IsPopImapAllowed return true");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether Dispose method not throw exception.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.EmailPolicy.Dispose M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MEX")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void Dispose_TEST()
+ {
+ try
+ {
+ DevicePolicyManager dpm = new DevicePolicyManager();
+ EmailPolicy emailPolicy = dpm.GetPolicy<EmailPolicy>();
+ emailPolicy.Dispose();
+ dpm.Dispose();
+ }
+ catch (Exception e)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, e.Message + " occured");
+ Assert.Fail("Should not throw Exception");
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Tests
+{
+ [TestFixture]
+ [Description("Tests Tizen.Security.DevicePolicy.LocationPolicy class")]
+ class LocationPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private LocationPolicy _locationPolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _locationPolicy = _dpm.GetPolicy<LocationPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _locationPolicy, _dpm");
+ _locationPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether LocationPolicyName returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.LocationPolicy.LocationPolicyName A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void LocationPolicyName_READ_ONLY()
+ {
+ Assert.IsInstanceOf<string>(LocationPolicy.LocationPolicyName);
+ Assert.AreEqual(LocationPolicy.LocationPolicyName, "Location");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether IsLocationAllowed returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.LocationPolicy.IsLocationAllowed A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void IsLocationAllowed_READ_ONLY()
+ {
+ Assert.IsInstanceOf<bool>(_locationPolicy.IsLocationAllowed);
+ Assert.True(_locationPolicy.IsLocationAllowed, "IsLocationAllowed return true");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether Dispose method not throw exception.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.LocationPolicy.Dispose M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MEX")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void Dispose_TEST()
+ {
+ try
+ {
+ DevicePolicyManager dpm = new DevicePolicyManager();
+ LocationPolicy locationPolicy = dpm.GetPolicy<LocationPolicy>();
+ locationPolicy.Dispose();
+ dpm.Dispose();
+ }
+ catch (Exception e)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, e.Message + " occured");
+ Assert.Fail("Should not throw Exception");
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Tests
+{
+ [TestFixture]
+ [Description("Tests Tizen.Security.DevicePolicy.MediaPolicy class")]
+ class MediaPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private MediaPolicy _mediaPolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _mediaPolicy = _dpm.GetPolicy<MediaPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _mediaPolicy, _dpm");
+ _mediaPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether CameraPolicyName returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.MediaPolicy.CameraPolicyName A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void CameraPolicyName_READ_ONLY()
+ {
+ Assert.IsInstanceOf<string>(MediaPolicy.CameraPolicyName);
+ Assert.AreEqual(MediaPolicy.CameraPolicyName, "Camera");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether MicrophonePolicyName returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.MediaPolicy.MicrophonePolicyName A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void MicrophonePolicyName_READ_ONLY()
+ {
+ Assert.IsInstanceOf<string>(MediaPolicy.MicrophonePolicyName);
+ Assert.AreEqual(MediaPolicy.MicrophonePolicyName, "Microphone");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether IsCameraAllowed returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.MediaPolicy.IsCameraAllowed A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void IsCameraAllowed_READ_ONLY()
+ {
+ Assert.IsInstanceOf<bool>(_mediaPolicy.IsCameraAllowed);
+ Assert.True(_mediaPolicy.IsCameraAllowed, "IsCameraAllowed return true");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether IsMicrophoneAllowed returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.MediaPolicy.IsMicrophoneAllowed A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void IsMicrophoneAllowed_READ_ONLY()
+ {
+ Assert.IsInstanceOf<bool>(_mediaPolicy.IsMicrophoneAllowed);
+ Assert.True(_mediaPolicy.IsMicrophoneAllowed, "IsMicrophoneAllowed return true");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether Dispose method not throw exception.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.MediaPolicy.Dispose M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MEX")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void Dispose_TEST()
+ {
+ try
+ {
+ DevicePolicyManager dpm = new DevicePolicyManager();
+ MediaPolicy mediaPolicy = dpm.GetPolicy<MediaPolicy>();
+ mediaPolicy.Dispose();
+ dpm.Dispose();
+ }
+ catch (Exception e)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, e.Message + " occured");
+ Assert.Fail("Should not throw Exception");
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Tests
+{
+ [TestFixture]
+ [Description("Tests Tizen.Security.DevicePolicy.PasswordPolicy class")]
+ class PasswordPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private PasswordPolicy _passwordPolicy;
+ private bool isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _passwordPolicy = _dpm.GetPolicy<PasswordPolicy>();
+ }
+ else
+ {
+ isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _dpm");
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether ExpireDay returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.PasswordPolicy.DaysToExpiration A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void DaysToExpiration_READ_ONLY()
+ {
+ Assert.IsInstanceOf<int>(_passwordPolicy.DaysToExpiration);
+ Assert.IsTrue(_passwordPolicy.DaysToExpiration == int.MaxValue || _passwordPolicy.DaysToExpiration == 0,
+ "The value of DaysToExpiration property should match value from getter");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether MinimumPreviousHistory returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.PasswordPolicy.MinimumPreviousHistory A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void MinimumPreviousHistory_READ_ONLY()
+ {
+ Assert.IsInstanceOf<int>(_passwordPolicy.MinimumPreviousHistory);
+ Assert.IsTrue(_passwordPolicy.MinimumPreviousHistory == 0,
+ "The value of MinimumPreviousHistory property should match value from getter");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether MaxInactivityTimeDeviceLock returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.PasswordPolicy.MaxInactivityTimeDeviceLock A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void MaxInactivityTimeDeviceLock_READ_ONLY()
+ {
+ Assert.IsInstanceOf<int>(_passwordPolicy.MaxInactivityTimeDeviceLock);
+ Assert.IsTrue(_passwordPolicy.MaxInactivityTimeDeviceLock == int.MaxValue || _passwordPolicy.MaxInactivityTimeDeviceLock == 0,
+ "The value of MaxInactivityTimeDeviceLock property should match value from getter");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether MaximumFailedAttemptsForWipe returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.PasswordPolicy.MaximumFailedAttemptsForWipe A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void MaximumFailedAttemptsForWipe_READ_ONLY()
+ {
+ Assert.IsInstanceOf<int>(_passwordPolicy.MaximumFailedAttemptsForWipe);
+ Assert.IsTrue(_passwordPolicy.MaximumFailedAttemptsForWipe == int.MaxValue || _passwordPolicy.MaximumFailedAttemptsForWipe == 0,
+ "The value of MaximumFailedAttemptsForWife property should match value from getter");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether MinimumRequiredComplexChars returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.PasswordPolicy.MinimumRequiredComplexChars A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void MinimumRequiredComplexChars_READ_ONLY()
+ {
+ Assert.IsInstanceOf<int>(_passwordPolicy.MinimumRequiredComplexChars);
+ Assert.IsTrue(_passwordPolicy.MinimumRequiredComplexChars == 0,
+ "The value of MinimumRequiredComplexChars property should match value from getter");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether MinimunLength returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.PasswordPolicy.MinimunLength A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void MinimunLength_READ_ONLY()
+ {
+ Assert.IsInstanceOf<int>(_passwordPolicy.MinimumRequiredComplexChars);
+ Assert.IsTrue(_passwordPolicy.MinimumRequiredComplexChars == 0,
+ "The value of MinimunLength property should match value from getter");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether Quality returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.PasswordPolicy.Quality A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void Quality_READ_ONLY()
+ {
+ Assert.IsInstanceOf<PasswordQuality>(_passwordPolicy.Quality);
+ Assert.IsTrue(_passwordPolicy.Quality == PasswordQuality.Unspecified,
+ "The value of password quality property should match value from getter");
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Tests
+{
+ [TestFixture]
+ [Description("Tests Tizen.Security.DevicePolicy.StoragePolicy class")]
+ class StoragePolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private StoragePolicy _storagePolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _storagePolicy = _dpm.GetPolicy<StoragePolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _storagePolicy, _dpm");
+ _storagePolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether ExternalStoragePolicyName returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.StoragePolicy.ExternalStoragePolicyName A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void ExternalStoragePolicyName_READ_ONLY()
+ {
+ Assert.IsInstanceOf<string>(StoragePolicy.ExternalStoragePolicyName);
+ Assert.AreEqual("ExternalStorage", StoragePolicy.ExternalStoragePolicyName);
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether IsExternalStorageAllowed returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.StoragePolicy.IsExternalStorageAllowed A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void IsExternalStorageAllowed_READ_ONLY()
+ {
+ Assert.IsInstanceOf<bool>(_storagePolicy.IsExternalStorageAllowed);
+ Assert.True(_storagePolicy.IsExternalStorageAllowed, "IsExternalStorageAllowed return true");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether Dispose method not throw exception.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.StoragePolicy.Dispose M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MEX")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void Dispose_TEST()
+ {
+ try
+ {
+ DevicePolicyManager dpm = new DevicePolicyManager();
+ StoragePolicy storagePolicy = dpm.GetPolicy<StoragePolicy>();
+ storagePolicy.Dispose();
+ dpm.Dispose();
+ }
+ catch (Exception e)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, e.Message + " occured");
+ Assert.Fail("Should not throw Exception");
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Tests
+{
+ [TestFixture]
+ [Description("Tests Tizen.Security.DevicePolicy.TelephonyPolicy class")]
+ class TelephonyPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private TelephonyPolicy _telephonyPolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _telephonyPolicy = _dpm.GetPolicy<TelephonyPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _telephonyPolicy, _dpm");
+ _telephonyPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether MessagingPolicyName returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.TelephonyPolicy.MessagingPolicyName A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void MessagingPolicyName_READ_ONLY()
+ {
+ Assert.IsInstanceOf<string>(TelephonyPolicy.MessagingPolicyName);
+ Assert.AreEqual("Messaging", TelephonyPolicy.MessagingPolicyName);
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether IsMessagingAllowed returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.TelephonyPolicy.IsMessagingAllowed M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void IsMessagingAllowed_READ_ONLY()
+ {
+ string testSim = "sim1";
+ bool currentState = _telephonyPolicy.IsMessagingAllowed(testSim);
+ Assert.True(currentState, "IsMessagingAllowed return true");
+ }
+
+ [Test]
+ [Category("P2")]
+ [Description("Check whether IsMessagingAllowed throws expected exception or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.TelephonyPolicy.IsMessagingAllowed M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MEX")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void IsMessagingAllowed_CHECK_ARGUMENT_EXCEPTION()
+ {
+ Assert.Throws<ArgumentException>(() => _telephonyPolicy.IsMessagingAllowed(null));
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether Dispose method not throw exception.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.TelephonyPolicy.Dispose M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MEX")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void Dispose_TEST()
+ {
+ try
+ {
+ DevicePolicyManager dpm = new DevicePolicyManager();
+ TelephonyPolicy telephonyPolicy = dpm.GetPolicy<TelephonyPolicy>();
+ telephonyPolicy.Dispose();
+ dpm.Dispose();
+ }
+ catch (Exception e)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, e.Message + " occured");
+ Assert.Fail("Should not throw Exception");
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Tests
+{
+ [TestFixture]
+ [Description("Tests Tizen.Security.DevicePolicy.UsbPolicy class")]
+ class UsbPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private UsbPolicy _usbPolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _usbPolicy = _dpm.GetPolicy<UsbPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _usbPolicy, _dpm");
+ _usbPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether UsbTetheringPolicyName returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.UsbPolicy.UsbTetheringPolicyName A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void UsbTetheringPolicyName_READ_ONLY()
+ {
+ Assert.IsInstanceOf<string>(UsbPolicy.UsbTetheringPolicyName);
+ Assert.AreEqual("UsbTethering", UsbPolicy.UsbTetheringPolicyName);
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether IsUsbTetheringAllowed returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.UsbPolicy.IsUsbTetheringAllowed A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void IsUsbTetheringAllowed_READ_ONLY()
+ {
+ Assert.IsInstanceOf<bool>(_usbPolicy.IsUsbTetheringAllowed);
+ Assert.True(_usbPolicy.IsUsbTetheringAllowed, "IsLocationAllowed return true");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether Dispose method not throw exception.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.UsbPolicy.Dispose M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MEX")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void Dispose_TEST()
+ {
+ try
+ {
+ DevicePolicyManager dpm = new DevicePolicyManager();
+ UsbPolicy usbPolicy = dpm.GetPolicy<UsbPolicy>();
+ usbPolicy.Dispose();
+ dpm.Dispose();
+ }
+ catch (Exception e)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, e.Message + " occured");
+ Assert.Fail("Should not throw Exception");
+ }
+ }
+ }
+}
--- /dev/null
+/*
+ * Copyright (c) 2019 Samsung Electronics Co., Ltd All Rights Reserved
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License
+ */
+
+using NUnit.Framework;
+using NUnit.Framework.TUnit;
+using System;
+using Tizen.System;
+
+namespace Tizen.Security.DevicePolicyManager.Tests
+{
+ [TestFixture]
+ [Description("Tests Tizen.Security.DevicePolicy.WifiPolicy class")]
+ class WifiPolicyTests
+ {
+ internal class Globals
+ {
+ internal const string LogTag = "DPMTC";
+ }
+
+ private DevicePolicyManager _dpm;
+ private WifiPolicy _wifiPolicy;
+ private bool _isSupported;
+
+ [SetUp]
+ public void Init()
+ {
+ string profile;
+ Information.TryGetValue("http://tizen.org/feature/profile", out profile);
+ if (String.Compare(profile, "mobile", true) == 0 || String.Compare(profile, "wearable", true) == 0)
+ {
+ _isSupported = true;
+ _dpm = new DevicePolicyManager();
+ _wifiPolicy = _dpm.GetPolicy<WifiPolicy>();
+ }
+ else
+ {
+ _isSupported = false;
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "The DevicePolicyManager is not supported.");
+ Assert.Pass("The DevicePolicyManager is not supported.");
+ }
+ }
+
+ [TearDown]
+ public void Destroy()
+ {
+ if (_isSupported)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, "Dispose _wifiPolicy, _dpm");
+ _wifiPolicy.Dispose();
+ _dpm.Dispose();
+ }
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether WifiPolicyName returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.WifiPolicy.WifiPolicyName A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void WifiPolicyName_READ_ONLY()
+ {
+ Assert.IsInstanceOf<string>(WifiPolicy.WifiPolicyName);
+ Assert.AreEqual("Wifi", WifiPolicy.WifiPolicyName);
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether WifiHotspotPolicyName returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.WifiPolicy.WifiHotspotPolicyName A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void WifiHotspotPolicyName_READ_ONLY()
+ {
+ Assert.IsInstanceOf<string>(WifiPolicy.WifiHotspotPolicyName);
+ Assert.AreEqual("WifiHotspot", WifiPolicy.WifiHotspotPolicyName);
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether IsWifiAllowed returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.WifiPolicy.IsWifiAllowed A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void IsWifiAllowed_READ_ONLY()
+ {
+ Assert.IsInstanceOf<bool>(_wifiPolicy.IsWifiAllowed);
+ Assert.True(_wifiPolicy.IsWifiAllowed, "IsWifiAllowed return true");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether IsWifiHotspotAllowed returns expected value or not.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.WifiPolicy.IsWifiHotspotAllowed A")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "PRO")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void IsWifiHotspotAllowed_READ_ONLY()
+ {
+ Assert.IsInstanceOf<bool>(_wifiPolicy.IsWifiHotspotAllowed);
+ Assert.True(_wifiPolicy.IsWifiHotspotAllowed, "IsLocationAllowed return true");
+ }
+
+ [Test]
+ [Category("P1")]
+ [Description("Check whether Dispose method not throw exception.")]
+ [Property("SPEC", "Tizen.Security.DevicePolicyManager.WifiPolicy.Dispose M")]
+ [Property("SPEC_URL", "-")]
+ [Property("CRITERIA", "MEX")]
+ [Property("AUTHOR", "Yeji Kim, yeji01.kim@samsung.com")]
+ public void Dispose_TEST()
+ {
+ try
+ {
+ DevicePolicyManager dpm = new DevicePolicyManager();
+ WifiPolicy wifiPolicy = dpm.GetPolicy<WifiPolicy>();
+ wifiPolicy.Dispose();
+ dpm.Dispose();
+ }
+ catch (Exception e)
+ {
+ LogUtils.Write(LogUtils.DEBUG, Globals.LogTag, e.Message + " occured");
+ Assert.Fail("Should not throw Exception");
+ }
+ }
+ }
+}
--- /dev/null
+<?xml version="1.0" encoding="utf-8"?>
+<manifest xmlns="http://tizen.org/ns/packages" api-version="6" package="Tizen.DevicePolicyManager.Tests" version="1.0.0">
+ <profile name="common" />
+ <ui-application appid="Tizen.DevicePolicyManager.Tests"
+ exec="Tizen.DevicePolicyManager.Tests.dll"
+ type="dotnet"
+ multiple="false"
+ taskmanage="true"
+ launch_mode="single">
+ <icon>Tizen.DevicePolicyManager.Tests.png</icon>
+ <label>Tizen.DevicePolicyManager.Tests</label>
+ </ui-application>
+ <privileges>
+ <privilege>http://tizen.org/privilege/appmanager.launch</privilege>
+ </privileges>
+</manifest>