Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(89)

Side by Side Diff: chrome/browser/chromeos/cros/network_library_unittest.cc

Issue 11578052: Replace OncNetworkParser by the new ONC translator. (Closed) Base URL: http://git.chromium.org/chromium/src.git@extend_onc_to_shill
Patch Set: Created 8 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <cert.h> 5 #include <cert.h>
6 #include <pk11pub.h> 6 #include <pk11pub.h>
7 7
8 #include <string> 8 #include <string>
9 #include <vector> 9 #include <vector>
10 10
11 #include "base/at_exit.h" 11 #include "base/at_exit.h"
12 #include "base/callback.h" 12 #include "base/callback.h"
13 #include "base/file_util.h" 13 #include "base/file_util.h"
14 #include "base/files/scoped_temp_dir.h" 14 #include "base/files/scoped_temp_dir.h"
15 #include "base/json/json_reader.h" 15 #include "base/json/json_reader.h"
16 #include "base/lazy_instance.h" 16 #include "base/lazy_instance.h"
17 #include "base/path_service.h" 17 #include "base/path_service.h"
18 #include "chrome/browser/chromeos/cros/cros_library.h" 18 #include "chrome/browser/chromeos/cros/cros_library.h"
19 #include "chrome/browser/chromeos/cros/network_library.h" 19 #include "chrome/browser/chromeos/cros/network_library.h"
20 #include "chrome/browser/chromeos/cros/onc_network_parser.h"
21 #include "chrome/common/chrome_paths.h" 20 #include "chrome/common/chrome_paths.h"
22 #include "chromeos/network/onc/onc_certificate_importer.h" 21 #include "chromeos/network/onc/onc_certificate_importer.h"
23 #include "chromeos/network/onc/onc_constants.h" 22 #include "chromeos/network/onc/onc_constants.h"
24 #include "chromeos/network/onc/onc_utils.h" 23 #include "chromeos/network/onc/onc_utils.h"
25 #include "crypto/nss_util.h" 24 #include "crypto/nss_util.h"
26 #include "net/base/crypto_module.h" 25 #include "net/base/crypto_module.h"
27 #include "net/base/nss_cert_database.h" 26 #include "net/base/nss_cert_database.h"
28 #include "net/base/x509_certificate.h" 27 #include "net/base/x509_certificate.h"
29 #include "testing/gmock/include/gmock/gmock.h" 28 #include "testing/gmock/include/gmock/gmock.h"
30 #include "testing/gtest/include/gtest/gtest.h" 29 #include "testing/gtest/include/gtest/gtest.h"
(...skipping 258 matching lines...) Expand 10 before | Expand all | Expand 10 after
289 WifiNetwork* wifi1 = cros_->FindWifiNetworkByPath("wifi1"); 288 WifiNetwork* wifi1 = cros_->FindWifiNetworkByPath("wifi1");
290 ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi1); 289 ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi1);
291 EXPECT_TRUE(wifi1->connected()); 290 EXPECT_TRUE(wifi1->connected());
292 cros_->DisconnectFromNetwork(wifi1); 291 cros_->DisconnectFromNetwork(wifi1);
293 EXPECT_FALSE(wifi1->connected()); 292 EXPECT_FALSE(wifi1->connected());
294 EXPECT_TRUE(cros_->CanConnectToNetwork(wifi1)); 293 EXPECT_TRUE(cros_->CanConnectToNetwork(wifi1));
295 cros_->ConnectToWifiNetwork(wifi1); 294 cros_->ConnectToWifiNetwork(wifi1);
296 EXPECT_TRUE(wifi1->connected()); 295 EXPECT_TRUE(wifi1->connected());
297 } 296 }
298 297
299 TEST_F(NetworkLibraryStubTest, NetworkConnectOncWifi) { 298 // TEST_F(NetworkLibraryStubTest, NetworkConnectOncWifi) {
300 // Import a wireless network via loading an ONC file. 299 // // Import a wireless network via loading an ONC file.
301 scoped_ptr<base::ListValue> network_configs; 300 // scoped_ptr<base::ListValue> network_configs;
302 scoped_ptr<base::ListValue> certificates; 301 // scoped_ptr<base::ListValue> certificates;
303 GetTestData("cert-pattern.onc", &certificates, &network_configs);
304 302
305 onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, 303 // WifiNetwork* wifi = cros_->FindWifiNetworkByPath("wifi_cert_pattern");
306 false /* don't allow webtrust */);
307 EXPECT_EQ(onc::CertificateImporter::IMPORT_OK,
308 importer.ParseAndStoreCertificates(*certificates));
309 304
310 OncNetworkParser parser(*network_configs, 305 // onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT,
311 onc::ONC_SOURCE_USER_IMPORT); 306 // false /* don't allow webtrust */);
312 ASSERT_TRUE(parser.parse_error().empty()); 307 // EXPECT_EQ(onc::CertificateImporter::IMPORT_OK,
313 EXPECT_EQ(1, parser.GetNetworkConfigsSize()); 308 // importer.ParseAndStoreCertificates(*certificates));
314 scoped_ptr<Network> network(parser.ParseNetwork(0, NULL));
315 ASSERT_TRUE(network.get());
316 EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type());
317 309
318 StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); 310 // OncNetworkParser parser(*network_configs,
311 // onc::ONC_SOURCE_USER_IMPORT);
312 // ASSERT_TRUE(parser.parse_error().empty());
313 // EXPECT_EQ(1, parser.GetNetworkConfigsSize());
314 // scoped_ptr<Network> network(parser.ParseNetwork(0, NULL));
315 // ASSERT_TRUE(network.get());
316 // EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type());
319 317
320 network->SetEnrollmentDelegate(enrollment_delegate); 318 // StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate();
321 EXPECT_FALSE(enrollment_delegate->did_enroll);
322 EXPECT_FALSE(enrollment_delegate->correct_args);
323 WifiNetwork* wifi1 = static_cast<WifiNetwork*>(network.get());
324 319
325 ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi1); 320 // network->SetEnrollmentDelegate(enrollment_delegate);
326 EXPECT_FALSE(wifi1->connected()); 321 // EXPECT_FALSE(enrollment_delegate->did_enroll);
327 EXPECT_TRUE(cros_->CanConnectToNetwork(wifi1)); 322 // EXPECT_FALSE(enrollment_delegate->correct_args);
328 EXPECT_FALSE(wifi1->connected()); 323 // WifiNetwork* wifi1 = static_cast<WifiNetwork*>(network.get());
329 wifi1->AttemptConnection(
330 base::Bind(&WifiNetworkConnectCallback, cros_, wifi1));
331 EXPECT_TRUE(wifi1->connected());
332 EXPECT_TRUE(enrollment_delegate->did_enroll);
333 EXPECT_TRUE(enrollment_delegate->correct_args);
334 }
335 324
336 TEST_F(NetworkLibraryStubTest, NetworkConnectOncVPN) { 325 // ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi1);
337 // Import a wireless network via loading an ONC file. 326 // EXPECT_FALSE(wifi1->connected());
338 scoped_ptr<base::ListValue> network_configs; 327 // EXPECT_TRUE(cros_->CanConnectToNetwork(wifi1));
339 scoped_ptr<base::ListValue> certificates; 328 // EXPECT_FALSE(wifi1->connected());
340 GetTestData("cert-pattern-vpn.onc", &certificates, &network_configs); 329 // wifi1->AttemptConnection(
330 // base::Bind(&WifiNetworkConnectCallback, cros_, wifi1));
331 // EXPECT_TRUE(wifi1->connected());
332 // EXPECT_TRUE(enrollment_delegate->did_enroll);
333 // EXPECT_TRUE(enrollment_delegate->correct_args);
334 // }
341 335
342 onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, 336 // TEST_F(NetworkLibraryStubTest, NetworkConnectOncVPN) {
343 false /* don't allow webtrust */); 337 // // Import a wireless network via loading an ONC file.
344 EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, 338 // scoped_ptr<base::ListValue> network_configs;
345 importer.ParseAndStoreCertificates(*certificates)); 339 // scoped_ptr<base::ListValue> certificates;
340 // GetTestData("cert-pattern-vpn.onc", &certificates, &network_configs);
346 341
347 OncNetworkParser parser(*network_configs, 342 // onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT,
348 onc::ONC_SOURCE_USER_IMPORT); 343 // false /* don't allow webtrust */);
349 ASSERT_TRUE(parser.parse_error().empty()); 344 // EXPECT_EQ(onc::CertificateImporter::IMPORT_OK,
350 EXPECT_EQ(1, parser.GetNetworkConfigsSize()); 345 // importer.ParseAndStoreCertificates(*certificates));
351 scoped_ptr<Network> network(parser.ParseNetwork(0, NULL));
352 ASSERT_TRUE(network.get());
353 EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type());
354 346
355 StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); 347 // OncNetworkParser parser(*network_configs,
348 // onc::ONC_SOURCE_USER_IMPORT);
349 // ASSERT_TRUE(parser.parse_error().empty());
350 // EXPECT_EQ(1, parser.GetNetworkConfigsSize());
351 // scoped_ptr<Network> network(parser.ParseNetwork(0, NULL));
352 // ASSERT_TRUE(network.get());
353 // EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type());
356 354
357 network->SetEnrollmentDelegate(enrollment_delegate); 355 // StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate();
358 EXPECT_FALSE(enrollment_delegate->did_enroll);
359 EXPECT_FALSE(enrollment_delegate->correct_args);
360 VirtualNetwork* vpn1 = static_cast<VirtualNetwork*>(network.get());
361 356
362 ASSERT_NE(static_cast<const VirtualNetwork*>(NULL), vpn1); 357 // network->SetEnrollmentDelegate(enrollment_delegate);
363 EXPECT_FALSE(vpn1->connected()); 358 // EXPECT_FALSE(enrollment_delegate->did_enroll);
364 EXPECT_TRUE(cros_->CanConnectToNetwork(vpn1)); 359 // EXPECT_FALSE(enrollment_delegate->correct_args);
365 EXPECT_FALSE(vpn1->connected()); 360 // VirtualNetwork* vpn1 = static_cast<VirtualNetwork*>(network.get());
366 vpn1->AttemptConnection( 361
367 base::Bind(&VirtualNetworkConnectCallback, cros_, vpn1)); 362 // ASSERT_NE(static_cast<const VirtualNetwork*>(NULL), vpn1);
368 EXPECT_TRUE(vpn1->connected()); 363 // EXPECT_FALSE(vpn1->connected());
369 EXPECT_TRUE(enrollment_delegate->did_enroll); 364 // EXPECT_TRUE(cros_->CanConnectToNetwork(vpn1));
370 EXPECT_TRUE(enrollment_delegate->correct_args); 365 // EXPECT_FALSE(vpn1->connected());
371 } 366 // vpn1->AttemptConnection(
367 // base::Bind(&VirtualNetworkConnectCallback, cros_, vpn1));
368 // EXPECT_TRUE(vpn1->connected());
369 // EXPECT_TRUE(enrollment_delegate->did_enroll);
370 // EXPECT_TRUE(enrollment_delegate->correct_args);
371 // }
stevenjb 2012/12/21 18:38:36 Remove?
Greg Spencer (Chromium) 2012/12/21 19:36:43 Yes, this should be removed. We don't check in co
pneubeck (no reviews) 2013/01/09 17:04:05 Done. Added new replacement tests.
372 372
373 TEST_F(NetworkLibraryStubTest, NetworkConnectVPN) { 373 TEST_F(NetworkLibraryStubTest, NetworkConnectVPN) {
374 VirtualNetwork* vpn1 = cros_->FindVirtualNetworkByPath("vpn1"); 374 VirtualNetwork* vpn1 = cros_->FindVirtualNetworkByPath("vpn1");
375 EXPECT_NE(static_cast<const VirtualNetwork*>(NULL), vpn1); 375 EXPECT_NE(static_cast<const VirtualNetwork*>(NULL), vpn1);
376 EXPECT_FALSE(vpn1->connected()); 376 EXPECT_FALSE(vpn1->connected());
377 EXPECT_TRUE(cros_->CanConnectToNetwork(vpn1)); 377 EXPECT_TRUE(cros_->CanConnectToNetwork(vpn1));
378 cros_->ConnectToVirtualNetwork(vpn1); 378 cros_->ConnectToVirtualNetwork(vpn1);
379 EXPECT_TRUE(vpn1->connected()); 379 EXPECT_TRUE(vpn1->connected());
380 ASSERT_NE(static_cast<const VirtualNetwork*>(NULL), cros_->virtual_network()); 380 ASSERT_NE(static_cast<const VirtualNetwork*>(NULL), cros_->virtual_network());
381 EXPECT_EQ("vpn1", cros_->virtual_network()->service_path()); 381 EXPECT_EQ("vpn1", cros_->virtual_network()->service_path());
382 } 382 }
383 383
384 // TODO(stevenjb): Test remembered networks. 384 // TODO(stevenjb): Test remembered networks.
385 385
386 // TODO(stevenjb): Test network profiles. 386 // TODO(stevenjb): Test network profiles.
387 387
388 // TODO(stevenjb): Test network devices. 388 // TODO(stevenjb): Test network devices.
389 389
390 // TODO(stevenjb): Test data plans. 390 // TODO(stevenjb): Test data plans.
391 391
392 // TODO(stevenjb): Test monitor network / device. 392 // TODO(stevenjb): Test monitor network / device.
393 393
394 } // namespace chromeos 394 } // namespace chromeos
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698