Chromium Code Reviews| Index: chrome/browser/chromeos/cros/network_library_unittest.cc |
| diff --git a/chrome/browser/chromeos/cros/network_library_unittest.cc b/chrome/browser/chromeos/cros/network_library_unittest.cc |
| index c5e8949acde9f06bef39751b94bcbfe3774a2fe7..8f270ac69adfef8b78af0289ed99769b2c008622 100644 |
| --- a/chrome/browser/chromeos/cros/network_library_unittest.cc |
| +++ b/chrome/browser/chromeos/cros/network_library_unittest.cc |
| @@ -17,7 +17,6 @@ |
| #include "base/path_service.h" |
| #include "chrome/browser/chromeos/cros/cros_library.h" |
| #include "chrome/browser/chromeos/cros/network_library.h" |
| -#include "chrome/browser/chromeos/cros/onc_network_parser.h" |
| #include "chrome/common/chrome_paths.h" |
| #include "chromeos/network/onc/onc_certificate_importer.h" |
| #include "chromeos/network/onc/onc_constants.h" |
| @@ -296,79 +295,80 @@ TEST_F(NetworkLibraryStubTest, NetworkConnectWifi) { |
| EXPECT_TRUE(wifi1->connected()); |
| } |
| -TEST_F(NetworkLibraryStubTest, NetworkConnectOncWifi) { |
| - // Import a wireless network via loading an ONC file. |
| - scoped_ptr<base::ListValue> network_configs; |
| - scoped_ptr<base::ListValue> certificates; |
| - GetTestData("cert-pattern.onc", &certificates, &network_configs); |
| - |
| - onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, |
| - false /* don't allow webtrust */); |
| - EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, |
| - importer.ParseAndStoreCertificates(*certificates)); |
| - |
| - OncNetworkParser parser(*network_configs, |
| - onc::ONC_SOURCE_USER_IMPORT); |
| - ASSERT_TRUE(parser.parse_error().empty()); |
| - EXPECT_EQ(1, parser.GetNetworkConfigsSize()); |
| - scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); |
| - ASSERT_TRUE(network.get()); |
| - EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type()); |
| - |
| - StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); |
| - |
| - network->SetEnrollmentDelegate(enrollment_delegate); |
| - EXPECT_FALSE(enrollment_delegate->did_enroll); |
| - EXPECT_FALSE(enrollment_delegate->correct_args); |
| - WifiNetwork* wifi1 = static_cast<WifiNetwork*>(network.get()); |
| - |
| - ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi1); |
| - EXPECT_FALSE(wifi1->connected()); |
| - EXPECT_TRUE(cros_->CanConnectToNetwork(wifi1)); |
| - EXPECT_FALSE(wifi1->connected()); |
| - wifi1->AttemptConnection( |
| - base::Bind(&WifiNetworkConnectCallback, cros_, wifi1)); |
| - EXPECT_TRUE(wifi1->connected()); |
| - EXPECT_TRUE(enrollment_delegate->did_enroll); |
| - EXPECT_TRUE(enrollment_delegate->correct_args); |
| -} |
| - |
| -TEST_F(NetworkLibraryStubTest, NetworkConnectOncVPN) { |
| - // Import a wireless network via loading an ONC file. |
| - scoped_ptr<base::ListValue> network_configs; |
| - scoped_ptr<base::ListValue> certificates; |
| - GetTestData("cert-pattern-vpn.onc", &certificates, &network_configs); |
| - |
| - onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, |
| - false /* don't allow webtrust */); |
| - EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, |
| - importer.ParseAndStoreCertificates(*certificates)); |
| - |
| - OncNetworkParser parser(*network_configs, |
| - onc::ONC_SOURCE_USER_IMPORT); |
| - ASSERT_TRUE(parser.parse_error().empty()); |
| - EXPECT_EQ(1, parser.GetNetworkConfigsSize()); |
| - scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); |
| - ASSERT_TRUE(network.get()); |
| - EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type()); |
| - |
| - StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); |
| - |
| - network->SetEnrollmentDelegate(enrollment_delegate); |
| - EXPECT_FALSE(enrollment_delegate->did_enroll); |
| - EXPECT_FALSE(enrollment_delegate->correct_args); |
| - VirtualNetwork* vpn1 = static_cast<VirtualNetwork*>(network.get()); |
| - |
| - ASSERT_NE(static_cast<const VirtualNetwork*>(NULL), vpn1); |
| - EXPECT_FALSE(vpn1->connected()); |
| - EXPECT_TRUE(cros_->CanConnectToNetwork(vpn1)); |
| - EXPECT_FALSE(vpn1->connected()); |
| - vpn1->AttemptConnection( |
| - base::Bind(&VirtualNetworkConnectCallback, cros_, vpn1)); |
| - EXPECT_TRUE(vpn1->connected()); |
| - EXPECT_TRUE(enrollment_delegate->did_enroll); |
| - EXPECT_TRUE(enrollment_delegate->correct_args); |
| -} |
| +// TEST_F(NetworkLibraryStubTest, NetworkConnectOncWifi) { |
| +// // Import a wireless network via loading an ONC file. |
| +// scoped_ptr<base::ListValue> network_configs; |
| +// scoped_ptr<base::ListValue> certificates; |
| + |
| +// WifiNetwork* wifi = cros_->FindWifiNetworkByPath("wifi_cert_pattern"); |
| + |
| +// onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, |
| +// false /* don't allow webtrust */); |
| +// EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, |
| +// importer.ParseAndStoreCertificates(*certificates)); |
| + |
| +// OncNetworkParser parser(*network_configs, |
| +// onc::ONC_SOURCE_USER_IMPORT); |
| +// ASSERT_TRUE(parser.parse_error().empty()); |
| +// EXPECT_EQ(1, parser.GetNetworkConfigsSize()); |
| +// scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); |
| +// ASSERT_TRUE(network.get()); |
| +// EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type()); |
| + |
| +// StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); |
| + |
| +// network->SetEnrollmentDelegate(enrollment_delegate); |
| +// EXPECT_FALSE(enrollment_delegate->did_enroll); |
| +// EXPECT_FALSE(enrollment_delegate->correct_args); |
| +// WifiNetwork* wifi1 = static_cast<WifiNetwork*>(network.get()); |
| + |
| +// ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi1); |
| +// EXPECT_FALSE(wifi1->connected()); |
| +// EXPECT_TRUE(cros_->CanConnectToNetwork(wifi1)); |
| +// EXPECT_FALSE(wifi1->connected()); |
| +// wifi1->AttemptConnection( |
| +// base::Bind(&WifiNetworkConnectCallback, cros_, wifi1)); |
| +// EXPECT_TRUE(wifi1->connected()); |
| +// EXPECT_TRUE(enrollment_delegate->did_enroll); |
| +// EXPECT_TRUE(enrollment_delegate->correct_args); |
| +// } |
| + |
| +// TEST_F(NetworkLibraryStubTest, NetworkConnectOncVPN) { |
| +// // Import a wireless network via loading an ONC file. |
| +// scoped_ptr<base::ListValue> network_configs; |
| +// scoped_ptr<base::ListValue> certificates; |
| +// GetTestData("cert-pattern-vpn.onc", &certificates, &network_configs); |
| + |
| +// onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, |
| +// false /* don't allow webtrust */); |
| +// EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, |
| +// importer.ParseAndStoreCertificates(*certificates)); |
| + |
| +// OncNetworkParser parser(*network_configs, |
| +// onc::ONC_SOURCE_USER_IMPORT); |
| +// ASSERT_TRUE(parser.parse_error().empty()); |
| +// EXPECT_EQ(1, parser.GetNetworkConfigsSize()); |
| +// scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); |
| +// ASSERT_TRUE(network.get()); |
| +// EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type()); |
| + |
| +// StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); |
| + |
| +// network->SetEnrollmentDelegate(enrollment_delegate); |
| +// EXPECT_FALSE(enrollment_delegate->did_enroll); |
| +// EXPECT_FALSE(enrollment_delegate->correct_args); |
| +// VirtualNetwork* vpn1 = static_cast<VirtualNetwork*>(network.get()); |
| + |
| +// ASSERT_NE(static_cast<const VirtualNetwork*>(NULL), vpn1); |
| +// EXPECT_FALSE(vpn1->connected()); |
| +// EXPECT_TRUE(cros_->CanConnectToNetwork(vpn1)); |
| +// EXPECT_FALSE(vpn1->connected()); |
| +// vpn1->AttemptConnection( |
| +// base::Bind(&VirtualNetworkConnectCallback, cros_, vpn1)); |
| +// EXPECT_TRUE(vpn1->connected()); |
| +// EXPECT_TRUE(enrollment_delegate->did_enroll); |
| +// EXPECT_TRUE(enrollment_delegate->correct_args); |
| +// } |
|
stevenjb
2012/12/21 18:38:36
Remove?
Greg Spencer (Chromium)
2012/12/21 19:36:43
Yes, this should be removed. We don't check in co
pneubeck (no reviews)
2013/01/09 17:04:05
Done. Added new replacement tests.
|
| TEST_F(NetworkLibraryStubTest, NetworkConnectVPN) { |
| VirtualNetwork* vpn1 = cros_->FindVirtualNetworkByPath("vpn1"); |