OLD | NEW |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chrome_notification_types.h" | 5 #include "chrome/browser/chrome_notification_types.h" |
6 #include "chrome/browser/chromeos/login/test/oobe_base_test.h" | 6 #include "chrome/browser/chromeos/login/test/oobe_base_test.h" |
7 #include "chrome/browser/chromeos/login/ui/webui_login_display.h" | 7 #include "chrome/browser/chromeos/login/ui/webui_login_display.h" |
8 #include "chromeos/chromeos_switches.h" | 8 #include "chromeos/chromeos_switches.h" |
9 #include "content/public/test/browser_test_utils.h" | 9 #include "content/public/test/browser_test_utils.h" |
10 #include "content/public/test/test_utils.h" | 10 #include "content/public/test/test_utils.h" |
11 | 11 |
12 namespace chromeos { | 12 namespace chromeos { |
13 namespace { | |
14 const char kFakeUserEmail[] = "fake-email@gmail.com"; | |
15 const char kFakeUserPassword[] = "fake-password"; | |
16 const char kFakeSIDCookie[] = "fake-SID-cookie"; | |
17 const char kFakeLSIDCookie[] = "fake-LSID-cookie"; | |
18 } | |
19 | 13 |
20 class WebviewLoginTest : public OobeBaseTest { | 14 class WebviewLoginTest : public OobeBaseTest { |
21 public: | 15 public: |
22 WebviewLoginTest() { use_webview_ = true; } | 16 WebviewLoginTest() { set_use_webview(true); } |
23 ~WebviewLoginTest() override {} | 17 ~WebviewLoginTest() override {} |
24 | 18 |
25 void SetUpOnMainThread() override { | |
26 fake_gaia_->SetFakeMergeSessionParams(kFakeUserEmail, kFakeSIDCookie, | |
27 kFakeLSIDCookie); | |
28 | |
29 OobeBaseTest::SetUpOnMainThread(); | |
30 } | |
31 | |
32 void SetUpCommandLine(base::CommandLine* command_line) override { | 19 void SetUpCommandLine(base::CommandLine* command_line) override { |
33 command_line->AppendSwitch(switches::kOobeSkipPostLogin); | 20 command_line->AppendSwitch(switches::kOobeSkipPostLogin); |
34 OobeBaseTest::SetUpCommandLine(command_line); | 21 OobeBaseTest::SetUpCommandLine(command_line); |
35 } | 22 } |
36 | 23 |
37 void WaitForGaiaPageLoaded() { | |
38 WaitForSigninScreen(); | |
39 | |
40 ASSERT_TRUE(content::ExecuteScript( | |
41 GetLoginUI()->GetWebContents(), | |
42 "$('gaia-signin').gaiaAuthHost_.addEventListener('ready'," | |
43 "function() {" | |
44 "window.domAutomationController.setAutomationId(0);" | |
45 "window.domAutomationController.send('GaiaReady');" | |
46 "});")); | |
47 | |
48 content::DOMMessageQueue message_queue; | |
49 std::string message; | |
50 ASSERT_TRUE(message_queue.WaitForMessage(&message)); | |
51 EXPECT_EQ("\"GaiaReady\"", message); | |
52 } | |
53 | |
54 private: | 24 private: |
55 DISALLOW_COPY_AND_ASSIGN(WebviewLoginTest); | 25 DISALLOW_COPY_AND_ASSIGN(WebviewLoginTest); |
56 }; | 26 }; |
57 | 27 |
58 IN_PROC_BROWSER_TEST_F(WebviewLoginTest, Basic) { | 28 IN_PROC_BROWSER_TEST_F(WebviewLoginTest, Basic) { |
59 WaitForGaiaPageLoaded(); | 29 WaitForGaiaPageLoad(); |
60 | 30 |
61 JsExpect("$('close-button-item').hidden"); | 31 JsExpect("$('close-button-item').hidden"); |
62 | 32 |
63 SetSignFormField("identifier", kFakeUserEmail); | 33 SetSignFormField("identifier", OobeBaseTest::kFakeUserEmail); |
64 ExecuteJsInSigninFrame("document.getElementById('nextButton').click();"); | 34 ExecuteJsInSigninFrame("document.getElementById('nextButton').click();"); |
65 | 35 |
66 JsExpect("$('close-button-item').hidden"); | 36 JsExpect("$('close-button-item').hidden"); |
67 | 37 |
68 content::WindowedNotificationObserver session_start_waiter( | 38 content::WindowedNotificationObserver session_start_waiter( |
69 chrome::NOTIFICATION_SESSION_STARTED, | 39 chrome::NOTIFICATION_SESSION_STARTED, |
70 content::NotificationService::AllSources()); | 40 content::NotificationService::AllSources()); |
71 | 41 |
72 SetSignFormField("password", kFakeUserPassword); | 42 SetSignFormField("password", OobeBaseTest::kFakeUserPassword); |
73 ExecuteJsInSigninFrame("document.getElementById('nextButton').click();"); | 43 ExecuteJsInSigninFrame("document.getElementById('nextButton').click();"); |
74 | 44 |
75 session_start_waiter.Wait(); | 45 session_start_waiter.Wait(); |
76 } | 46 } |
77 | 47 |
78 IN_PROC_BROWSER_TEST_F(WebviewLoginTest, BackButton) { | 48 IN_PROC_BROWSER_TEST_F(WebviewLoginTest, BackButton) { |
79 WaitForGaiaPageLoaded(); | 49 WaitForGaiaPageLoad(); |
80 | 50 |
81 // Start: no back button, first page. | 51 // Start: no back button, first page. |
82 JsExpect("$('back-button-item').hidden"); | 52 JsExpect("$('back-button-item').hidden"); |
83 JsExpect("$('signin-frame').src.indexOf('#identifier') != -1"); | 53 JsExpect("$('signin-frame').src.indexOf('#identifier') != -1"); |
84 | 54 |
85 // Next step: back button active, second page. | 55 // Next step: back button active, second page. |
86 SetSignFormField("identifier", kFakeUserEmail); | 56 SetSignFormField("identifier", OobeBaseTest::kFakeUserEmail); |
87 ExecuteJsInSigninFrame("document.getElementById('nextButton').click();"); | 57 ExecuteJsInSigninFrame("document.getElementById('nextButton').click();"); |
88 JsExpect("!$('back-button-item').hidden"); | 58 JsExpect("!$('back-button-item').hidden"); |
89 JsExpect("$('signin-frame').src.indexOf('#challengepassword') != -1"); | 59 JsExpect("$('signin-frame').src.indexOf('#challengepassword') != -1"); |
90 | 60 |
91 // One step back: no back button, first page. | 61 // One step back: no back button, first page. |
92 ASSERT_TRUE(content::ExecuteScript(GetLoginUI()->GetWebContents(), | 62 ASSERT_TRUE(content::ExecuteScript(GetLoginUI()->GetWebContents(), |
93 "$('back-button-item').click();")); | 63 "$('back-button-item').click();")); |
94 JsExpect("$('back-button-item').hidden"); | 64 JsExpect("$('back-button-item').hidden"); |
95 JsExpect("$('signin-frame').src.indexOf('#identifier') != -1"); | 65 JsExpect("$('signin-frame').src.indexOf('#identifier') != -1"); |
96 | 66 |
97 // Next step (again): back button active, second page, user id remembered. | 67 // Next step (again): back button active, second page, user id remembered. |
98 ExecuteJsInSigninFrame("document.getElementById('nextButton').click();"); | 68 ExecuteJsInSigninFrame("document.getElementById('nextButton').click();"); |
99 JsExpect("!$('back-button-item').hidden"); | 69 JsExpect("!$('back-button-item').hidden"); |
100 JsExpect("$('signin-frame').src.indexOf('#challengepassword') != -1"); | 70 JsExpect("$('signin-frame').src.indexOf('#challengepassword') != -1"); |
101 | 71 |
102 content::WindowedNotificationObserver session_start_waiter( | 72 content::WindowedNotificationObserver session_start_waiter( |
103 chrome::NOTIFICATION_SESSION_STARTED, | 73 chrome::NOTIFICATION_SESSION_STARTED, |
104 content::NotificationService::AllSources()); | 74 content::NotificationService::AllSources()); |
105 | 75 |
106 SetSignFormField("password", kFakeUserPassword); | 76 SetSignFormField("password", OobeBaseTest::kFakeUserPassword); |
107 ExecuteJsInSigninFrame("document.getElementById('nextButton').click();"); | 77 ExecuteJsInSigninFrame("document.getElementById('nextButton').click();"); |
108 | 78 |
109 session_start_waiter.Wait(); | 79 session_start_waiter.Wait(); |
110 } | 80 } |
111 | 81 |
112 } // namespace chromeos | 82 } // namespace chromeos |
OLD | NEW |