diff options
author | android-build-prod (mdb) <android-build-team-robot@google.com> | 2020-04-07 20:06:44 +0000 |
---|---|---|
committer | Gerrit Code Review <noreply-gerritcodereview@google.com> | 2020-04-07 20:06:44 +0000 |
commit | 8f24ce92650847b69e9ebbf4493ef6f413b9a421 (patch) | |
tree | b81b73e1d615477f9b19d34d085a99dd4b9b8f45 | |
parent | 514cfa79a381e24a789e799aafec6f19e8cf4941 (diff) | |
parent | fe8a5de124c222d88138df62f4ca608924d887dd (diff) | |
download | cts-sparse-6373483-L65000000537379436.tar.gz |
Merge "Snap for 6369585 from a8fc0658c457c2d9c85436c52d963a6427f9e428 to pie-cts-release" into pie-cts-releasesparse-6373483-L65000000537379436
4 files changed, 38 insertions, 13 deletions
diff --git a/common/device-side/device-info/src/com/android/compatibility/common/deviceinfo/PackageDeviceInfo.java b/common/device-side/device-info/src/com/android/compatibility/common/deviceinfo/PackageDeviceInfo.java index e953724531d..22688ed6b62 100644 --- a/common/device-side/device-info/src/com/android/compatibility/common/deviceinfo/PackageDeviceInfo.java +++ b/common/device-side/device-info/src/com/android/compatibility/common/deviceinfo/PackageDeviceInfo.java @@ -21,6 +21,7 @@ import android.content.pm.PackageManager; import android.content.pm.PermissionInfo; import android.os.Build; import com.android.compatibility.common.util.DeviceInfoStore; +import com.android.compatibility.common.util.PackageUtil; import java.io.IOException; import java.util.*; @@ -52,6 +53,8 @@ public class PackageDeviceInfo extends DeviceInfo { private static final String SHARES_INSTALL_PERMISSION = "shares_install_packages_permission"; private static final String INSTALL_PACKAGES_PERMISSION = "android.permission.INSTALL_PACKAGES"; + private static final String SHA256_CERT = "sha256_cert"; + @Override protected void collectDeviceInfo(DeviceInfoStore store) throws Exception { final PackageManager pm = getContext().getPackageManager(); @@ -96,6 +99,8 @@ public class PackageDeviceInfo extends DeviceInfo { final boolean canInstall = sharesUidWithInstallerPackage(pm, appInfo.uid); store.addResult(SHARES_INSTALL_PERMISSION, canInstall); } + String sha256_cert = PackageUtil.computePackageSignatureDigest(pkg.packageName); + store.addResult(SHA256_CERT, sha256_cert); store.endGroup(); } diff --git a/hostsidetests/statsd/src/android/cts/statsd/validation/ValidationTests.java b/hostsidetests/statsd/src/android/cts/statsd/validation/ValidationTests.java index c0c8340d291..eaf25c8373f 100644 --- a/hostsidetests/statsd/src/android/cts/statsd/validation/ValidationTests.java +++ b/hostsidetests/statsd/src/android/cts/statsd/validation/ValidationTests.java @@ -135,9 +135,9 @@ public class ValidationTests extends DeviceAtomTestCase { assertNotNull(wl); assertTrue(wl.getDurationMs() > 0); assertTrue(wl.getCount() == 1); - assertTrue(wl.getMaxDurationMs() >= 500); + assertTrue(wl.getMaxDurationMs() >= 400); assertTrue(wl.getMaxDurationMs() < 700); - assertTrue(wl.getTotalDurationMs() >= 500); + assertTrue(wl.getTotalDurationMs() >= 400); assertTrue(wl.getTotalDurationMs() < 700); setAodState(aodState); // restores AOD to initial state. diff --git a/tests/tests/batterysaving/src/android/os/cts/batterysaving/BatterySaverAlarmTest.java b/tests/tests/batterysaving/src/android/os/cts/batterysaving/BatterySaverAlarmTest.java index 4fc9dd68177..e935a34df2a 100644 --- a/tests/tests/batterysaving/src/android/os/cts/batterysaving/BatterySaverAlarmTest.java +++ b/tests/tests/batterysaving/src/android/os/cts/batterysaving/BatterySaverAlarmTest.java @@ -69,6 +69,7 @@ public class BatterySaverAlarmTest extends BatterySavingTestBase { private static final long DEFAULT_WAIT = 1_000; private static final long POLL_INTERVAL = 200; + private static final long THROTTLED_WAIT = 5_000; // Tweaked alarm manager constants to facilitate testing private static final long MIN_REPEATING_INTERVAL = 5_000; @@ -177,7 +178,8 @@ public class BatterySaverAlarmTest extends BatterySavingTestBase { forcePackageIntoBg(targetPackage); // First alarm shouldn't be throttled. - final long triggerElapsed1 = SystemClock.elapsedRealtime() + MIN_FUTURITY; + long now = SystemClock.elapsedRealtime(); + final long triggerElapsed1 = now + MIN_FUTURITY; scheduleAlarm(targetPackage, AlarmManager.ELAPSED_REALTIME_WAKEUP, triggerElapsed1); ThreadUtils.sleepUntilRealtime(triggerElapsed1 + DEFAULT_WAIT); assertEquals("Allow-while-idle alarm shouldn't be blocked in battery saver", @@ -186,14 +188,30 @@ public class BatterySaverAlarmTest extends BatterySavingTestBase { // Second one should be throttled. mAlarmCount.set(0); - final long triggerElapsed2 = triggerElapsed1 + ALLOW_WHILE_IDLE_SHORT_TIME; + // Check that the alarm scheduled at triggerElapsed2 + // fires between triggerElapsed2 and (triggerElapsed3+THROTTLED_WAIT). + now = SystemClock.elapsedRealtime(); + final long triggerElapsed2 = now + ALLOW_WHILE_IDLE_SHORT_TIME; + final long triggerElapsed3 = now + ALLOW_WHILE_IDLE_LONG_TIME; scheduleAlarm(targetPackage, AlarmManager.ELAPSED_REALTIME_WAKEUP, triggerElapsed2); - ThreadUtils.sleepUntilRealtime(triggerElapsed2 + DEFAULT_WAIT); - assertEquals("Follow up allow-while-idle alarm shouldn't go off before short time", - 0, mAlarmCount.get()); - final long triggerElapsed3 = triggerElapsed1 + ALLOW_WHILE_IDLE_LONG_TIME; - ThreadUtils.sleepUntilRealtime(triggerElapsed3 + DEFAULT_WAIT); + // Check the time first before checking the alarm counter to avoid a + // situation when the alarm fires between sleepUntilRealtime and + // assertEquals. + while (true) { + Thread.sleep(DEFAULT_WAIT); + + final int alarmCount = mAlarmCount.get(); + if (SystemClock.elapsedRealtime() < triggerElapsed2) { + assertEquals("Follow up allow-while-idle alarm shouldn't go off " + + "before short time", + 0, alarmCount); + } else { + break; + } + } + + ThreadUtils.sleepUntilRealtime(triggerElapsed3 + THROTTLED_WAIT); assertEquals("Follow-up allow-while-idle alarm should go off after long time", 1, mAlarmCount.get()); @@ -202,7 +220,8 @@ public class BatterySaverAlarmTest extends BatterySavingTestBase { startService(targetPackage, true); - final long triggerElapsed4 = triggerElapsed3 + ALLOW_WHILE_IDLE_SHORT_TIME; + now = SystemClock.elapsedRealtime(); + final long triggerElapsed4 = now + ALLOW_WHILE_IDLE_SHORT_TIME; scheduleAlarm(targetPackage, AlarmManager.ELAPSED_REALTIME_WAKEUP, triggerElapsed4); ThreadUtils.sleepUntilRealtime(triggerElapsed4 + DEFAULT_WAIT); assertEquals("Allow-while-idle alarm shouldn't be throttled in battery saver" @@ -214,7 +233,8 @@ public class BatterySaverAlarmTest extends BatterySavingTestBase { mAlarmCount.set(0); - final long triggerElapsed5 = triggerElapsed4 + ALLOW_WHILE_IDLE_SHORT_TIME; + now = SystemClock.elapsedRealtime(); + final long triggerElapsed5 = now + ALLOW_WHILE_IDLE_SHORT_TIME; scheduleAlarm(targetPackage, AlarmManager.ELAPSED_REALTIME_WAKEUP, triggerElapsed5); ThreadUtils.sleepUntilRealtime(triggerElapsed5 + DEFAULT_WAIT); assertEquals("Allow-while-idle alarm shouldn't be throttled in battery saver" @@ -224,7 +244,8 @@ public class BatterySaverAlarmTest extends BatterySavingTestBase { // One more time. mAlarmCount.set(0); - final long triggerElapsed6 = triggerElapsed5 + ALLOW_WHILE_IDLE_SHORT_TIME; + now = SystemClock.elapsedRealtime(); + final long triggerElapsed6 = now + ALLOW_WHILE_IDLE_SHORT_TIME; scheduleAlarm(targetPackage, AlarmManager.ELAPSED_REALTIME_WAKEUP, triggerElapsed6); ThreadUtils.sleepUntilRealtime(triggerElapsed6 + DEFAULT_WAIT); assertEquals("Allow-while-idle alarm shouldn't be throttled when BS is off", diff --git a/tests/tests/telephony/src/android/telephony/cts/TelephonyManagerTest.java b/tests/tests/telephony/src/android/telephony/cts/TelephonyManagerTest.java index 9095ed0a976..c61bcf7e8d4 100644 --- a/tests/tests/telephony/src/android/telephony/cts/TelephonyManagerTest.java +++ b/tests/tests/telephony/src/android/telephony/cts/TelephonyManagerTest.java @@ -264,7 +264,6 @@ public class TelephonyManagerTest { assertTrue("Phone count should be > 0", phoneCount > 0); break; case TelephonyManager.PHONE_TYPE_NONE: - assertTrue("Phone count should be 0", phoneCount == 0 || phoneCount == 1); break; default: throw new IllegalArgumentException("Did you add a new phone type? " + phoneType); |