OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <cert.h> | 5 #include <cert.h> |
6 #include <pk11pub.h> | 6 #include <pk11pub.h> |
7 | 7 |
8 #include <string> | 8 #include <string> |
9 #include <vector> | 9 #include <vector> |
10 | 10 |
11 #include "base/at_exit.h" | 11 #include "base/at_exit.h" |
12 #include "base/callback.h" | 12 #include "base/callback.h" |
13 #include "base/file_util.h" | 13 #include "base/file_util.h" |
14 #include "base/files/scoped_temp_dir.h" | 14 #include "base/files/scoped_temp_dir.h" |
15 #include "base/json/json_reader.h" | 15 #include "base/json/json_reader.h" |
16 #include "base/lazy_instance.h" | 16 #include "base/lazy_instance.h" |
17 #include "base/path_service.h" | 17 #include "base/path_service.h" |
18 #include "chrome/browser/chromeos/cros/cros_library.h" | 18 #include "chrome/browser/chromeos/cros/cros_library.h" |
19 #include "chrome/browser/chromeos/cros/network_library.h" | 19 #include "chrome/browser/chromeos/cros/network_library.h" |
20 #include "chrome/browser/chromeos/cros/onc_network_parser.h" | |
21 #include "chrome/common/chrome_paths.h" | 20 #include "chrome/common/chrome_paths.h" |
22 #include "chromeos/network/onc/onc_certificate_importer.h" | 21 #include "chromeos/network/onc/onc_certificate_importer.h" |
23 #include "chromeos/network/onc/onc_constants.h" | 22 #include "chromeos/network/onc/onc_constants.h" |
24 #include "chromeos/network/onc/onc_utils.h" | 23 #include "chromeos/network/onc/onc_utils.h" |
25 #include "crypto/nss_util.h" | 24 #include "crypto/nss_util.h" |
26 #include "net/base/crypto_module.h" | 25 #include "net/base/crypto_module.h" |
27 #include "net/base/nss_cert_database.h" | 26 #include "net/base/nss_cert_database.h" |
28 #include "net/base/x509_certificate.h" | 27 #include "net/base/x509_certificate.h" |
29 #include "testing/gmock/include/gmock/gmock.h" | 28 #include "testing/gmock/include/gmock/gmock.h" |
30 #include "testing/gtest/include/gtest/gtest.h" | 29 #include "testing/gtest/include/gtest/gtest.h" |
(...skipping 258 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
289 WifiNetwork* wifi1 = cros_->FindWifiNetworkByPath("wifi1"); | 288 WifiNetwork* wifi1 = cros_->FindWifiNetworkByPath("wifi1"); |
290 ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi1); | 289 ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi1); |
291 EXPECT_TRUE(wifi1->connected()); | 290 EXPECT_TRUE(wifi1->connected()); |
292 cros_->DisconnectFromNetwork(wifi1); | 291 cros_->DisconnectFromNetwork(wifi1); |
293 EXPECT_FALSE(wifi1->connected()); | 292 EXPECT_FALSE(wifi1->connected()); |
294 EXPECT_TRUE(cros_->CanConnectToNetwork(wifi1)); | 293 EXPECT_TRUE(cros_->CanConnectToNetwork(wifi1)); |
295 cros_->ConnectToWifiNetwork(wifi1); | 294 cros_->ConnectToWifiNetwork(wifi1); |
296 EXPECT_TRUE(wifi1->connected()); | 295 EXPECT_TRUE(wifi1->connected()); |
297 } | 296 } |
298 | 297 |
299 TEST_F(NetworkLibraryStubTest, NetworkConnectOncWifi) { | 298 // TEST_F(NetworkLibraryStubTest, NetworkConnectOncWifi) { |
300 // Import a wireless network via loading an ONC file. | 299 // // Import a wireless network via loading an ONC file. |
301 scoped_ptr<base::ListValue> network_configs; | 300 // scoped_ptr<base::ListValue> network_configs; |
302 scoped_ptr<base::ListValue> certificates; | 301 // scoped_ptr<base::ListValue> certificates; |
303 GetTestData("cert-pattern.onc", &certificates, &network_configs); | |
304 | 302 |
305 onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, | 303 // WifiNetwork* wifi = cros_->FindWifiNetworkByPath("wifi_cert_pattern"); |
306 false /* don't allow webtrust */); | |
307 EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, | |
308 importer.ParseAndStoreCertificates(*certificates)); | |
309 | 304 |
310 OncNetworkParser parser(*network_configs, | 305 // onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, |
311 onc::ONC_SOURCE_USER_IMPORT); | 306 // false /* don't allow webtrust */); |
312 ASSERT_TRUE(parser.parse_error().empty()); | 307 // EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, |
313 EXPECT_EQ(1, parser.GetNetworkConfigsSize()); | 308 // importer.ParseAndStoreCertificates(*certificates)); |
314 scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); | |
315 ASSERT_TRUE(network.get()); | |
316 EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type()); | |
317 | 309 |
318 StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); | 310 // OncNetworkParser parser(*network_configs, |
311 // onc::ONC_SOURCE_USER_IMPORT); | |
312 // ASSERT_TRUE(parser.parse_error().empty()); | |
313 // EXPECT_EQ(1, parser.GetNetworkConfigsSize()); | |
314 // scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); | |
315 // ASSERT_TRUE(network.get()); | |
316 // EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type()); | |
319 | 317 |
320 network->SetEnrollmentDelegate(enrollment_delegate); | 318 // StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); |
321 EXPECT_FALSE(enrollment_delegate->did_enroll); | |
322 EXPECT_FALSE(enrollment_delegate->correct_args); | |
323 WifiNetwork* wifi1 = static_cast<WifiNetwork*>(network.get()); | |
324 | 319 |
325 ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi1); | 320 // network->SetEnrollmentDelegate(enrollment_delegate); |
326 EXPECT_FALSE(wifi1->connected()); | 321 // EXPECT_FALSE(enrollment_delegate->did_enroll); |
327 EXPECT_TRUE(cros_->CanConnectToNetwork(wifi1)); | 322 // EXPECT_FALSE(enrollment_delegate->correct_args); |
328 EXPECT_FALSE(wifi1->connected()); | 323 // WifiNetwork* wifi1 = static_cast<WifiNetwork*>(network.get()); |
329 wifi1->AttemptConnection( | |
330 base::Bind(&WifiNetworkConnectCallback, cros_, wifi1)); | |
331 EXPECT_TRUE(wifi1->connected()); | |
332 EXPECT_TRUE(enrollment_delegate->did_enroll); | |
333 EXPECT_TRUE(enrollment_delegate->correct_args); | |
334 } | |
335 | 324 |
336 TEST_F(NetworkLibraryStubTest, NetworkConnectOncVPN) { | 325 // ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi1); |
337 // Import a wireless network via loading an ONC file. | 326 // EXPECT_FALSE(wifi1->connected()); |
338 scoped_ptr<base::ListValue> network_configs; | 327 // EXPECT_TRUE(cros_->CanConnectToNetwork(wifi1)); |
339 scoped_ptr<base::ListValue> certificates; | 328 // EXPECT_FALSE(wifi1->connected()); |
340 GetTestData("cert-pattern-vpn.onc", &certificates, &network_configs); | 329 // wifi1->AttemptConnection( |
330 // base::Bind(&WifiNetworkConnectCallback, cros_, wifi1)); | |
331 // EXPECT_TRUE(wifi1->connected()); | |
332 // EXPECT_TRUE(enrollment_delegate->did_enroll); | |
333 // EXPECT_TRUE(enrollment_delegate->correct_args); | |
334 // } | |
341 | 335 |
342 onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, | 336 // TEST_F(NetworkLibraryStubTest, NetworkConnectOncVPN) { |
343 false /* don't allow webtrust */); | 337 // // Import a wireless network via loading an ONC file. |
344 EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, | 338 // scoped_ptr<base::ListValue> network_configs; |
345 importer.ParseAndStoreCertificates(*certificates)); | 339 // scoped_ptr<base::ListValue> certificates; |
340 // GetTestData("cert-pattern-vpn.onc", &certificates, &network_configs); | |
346 | 341 |
347 OncNetworkParser parser(*network_configs, | 342 // onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, |
348 onc::ONC_SOURCE_USER_IMPORT); | 343 // false /* don't allow webtrust */); |
349 ASSERT_TRUE(parser.parse_error().empty()); | 344 // EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, |
350 EXPECT_EQ(1, parser.GetNetworkConfigsSize()); | 345 // importer.ParseAndStoreCertificates(*certificates)); |
351 scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); | |
352 ASSERT_TRUE(network.get()); | |
353 EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type()); | |
354 | 346 |
355 StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); | 347 // OncNetworkParser parser(*network_configs, |
348 // onc::ONC_SOURCE_USER_IMPORT); | |
349 // ASSERT_TRUE(parser.parse_error().empty()); | |
350 // EXPECT_EQ(1, parser.GetNetworkConfigsSize()); | |
351 // scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); | |
352 // ASSERT_TRUE(network.get()); | |
353 // EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type()); | |
356 | 354 |
357 network->SetEnrollmentDelegate(enrollment_delegate); | 355 // StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); |
358 EXPECT_FALSE(enrollment_delegate->did_enroll); | |
359 EXPECT_FALSE(enrollment_delegate->correct_args); | |
360 VirtualNetwork* vpn1 = static_cast<VirtualNetwork*>(network.get()); | |
361 | 356 |
362 ASSERT_NE(static_cast<const VirtualNetwork*>(NULL), vpn1); | 357 // network->SetEnrollmentDelegate(enrollment_delegate); |
363 EXPECT_FALSE(vpn1->connected()); | 358 // EXPECT_FALSE(enrollment_delegate->did_enroll); |
364 EXPECT_TRUE(cros_->CanConnectToNetwork(vpn1)); | 359 // EXPECT_FALSE(enrollment_delegate->correct_args); |
365 EXPECT_FALSE(vpn1->connected()); | 360 // VirtualNetwork* vpn1 = static_cast<VirtualNetwork*>(network.get()); |
366 vpn1->AttemptConnection( | 361 |
367 base::Bind(&VirtualNetworkConnectCallback, cros_, vpn1)); | 362 // ASSERT_NE(static_cast<const VirtualNetwork*>(NULL), vpn1); |
368 EXPECT_TRUE(vpn1->connected()); | 363 // EXPECT_FALSE(vpn1->connected()); |
369 EXPECT_TRUE(enrollment_delegate->did_enroll); | 364 // EXPECT_TRUE(cros_->CanConnectToNetwork(vpn1)); |
370 EXPECT_TRUE(enrollment_delegate->correct_args); | 365 // EXPECT_FALSE(vpn1->connected()); |
371 } | 366 // vpn1->AttemptConnection( |
367 // base::Bind(&VirtualNetworkConnectCallback, cros_, vpn1)); | |
368 // EXPECT_TRUE(vpn1->connected()); | |
369 // EXPECT_TRUE(enrollment_delegate->did_enroll); | |
370 // EXPECT_TRUE(enrollment_delegate->correct_args); | |
371 // } | |
stevenjb
2012/12/21 18:38:36
Remove?
Greg Spencer (Chromium)
2012/12/21 19:36:43
Yes, this should be removed. We don't check in co
pneubeck (no reviews)
2013/01/09 17:04:05
Done. Added new replacement tests.
| |
372 | 372 |
373 TEST_F(NetworkLibraryStubTest, NetworkConnectVPN) { | 373 TEST_F(NetworkLibraryStubTest, NetworkConnectVPN) { |
374 VirtualNetwork* vpn1 = cros_->FindVirtualNetworkByPath("vpn1"); | 374 VirtualNetwork* vpn1 = cros_->FindVirtualNetworkByPath("vpn1"); |
375 EXPECT_NE(static_cast<const VirtualNetwork*>(NULL), vpn1); | 375 EXPECT_NE(static_cast<const VirtualNetwork*>(NULL), vpn1); |
376 EXPECT_FALSE(vpn1->connected()); | 376 EXPECT_FALSE(vpn1->connected()); |
377 EXPECT_TRUE(cros_->CanConnectToNetwork(vpn1)); | 377 EXPECT_TRUE(cros_->CanConnectToNetwork(vpn1)); |
378 cros_->ConnectToVirtualNetwork(vpn1); | 378 cros_->ConnectToVirtualNetwork(vpn1); |
379 EXPECT_TRUE(vpn1->connected()); | 379 EXPECT_TRUE(vpn1->connected()); |
380 ASSERT_NE(static_cast<const VirtualNetwork*>(NULL), cros_->virtual_network()); | 380 ASSERT_NE(static_cast<const VirtualNetwork*>(NULL), cros_->virtual_network()); |
381 EXPECT_EQ("vpn1", cros_->virtual_network()->service_path()); | 381 EXPECT_EQ("vpn1", cros_->virtual_network()->service_path()); |
382 } | 382 } |
383 | 383 |
384 // TODO(stevenjb): Test remembered networks. | 384 // TODO(stevenjb): Test remembered networks. |
385 | 385 |
386 // TODO(stevenjb): Test network profiles. | 386 // TODO(stevenjb): Test network profiles. |
387 | 387 |
388 // TODO(stevenjb): Test network devices. | 388 // TODO(stevenjb): Test network devices. |
389 | 389 |
390 // TODO(stevenjb): Test data plans. | 390 // TODO(stevenjb): Test data plans. |
391 | 391 |
392 // TODO(stevenjb): Test monitor network / device. | 392 // TODO(stevenjb): Test monitor network / device. |
393 | 393 |
394 } // namespace chromeos | 394 } // namespace chromeos |
OLD | NEW |