Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(506)

Unified Diff: chrome/browser/chromeos/cros/network_library_unittest.cc

Issue 11578052: Replace OncNetworkParser by the new ONC translator. (Closed) Base URL: http://git.chromium.org/chromium/src.git@extend_onc_to_shill
Patch Set: Created 8 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/chromeos/cros/network_library_unittest.cc
diff --git a/chrome/browser/chromeos/cros/network_library_unittest.cc b/chrome/browser/chromeos/cros/network_library_unittest.cc
index c5e8949acde9f06bef39751b94bcbfe3774a2fe7..8f270ac69adfef8b78af0289ed99769b2c008622 100644
--- a/chrome/browser/chromeos/cros/network_library_unittest.cc
+++ b/chrome/browser/chromeos/cros/network_library_unittest.cc
@@ -17,7 +17,6 @@
#include "base/path_service.h"
#include "chrome/browser/chromeos/cros/cros_library.h"
#include "chrome/browser/chromeos/cros/network_library.h"
-#include "chrome/browser/chromeos/cros/onc_network_parser.h"
#include "chrome/common/chrome_paths.h"
#include "chromeos/network/onc/onc_certificate_importer.h"
#include "chromeos/network/onc/onc_constants.h"
@@ -296,79 +295,80 @@ TEST_F(NetworkLibraryStubTest, NetworkConnectWifi) {
EXPECT_TRUE(wifi1->connected());
}
-TEST_F(NetworkLibraryStubTest, NetworkConnectOncWifi) {
- // Import a wireless network via loading an ONC file.
- scoped_ptr<base::ListValue> network_configs;
- scoped_ptr<base::ListValue> certificates;
- GetTestData("cert-pattern.onc", &certificates, &network_configs);
-
- onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT,
- false /* don't allow webtrust */);
- EXPECT_EQ(onc::CertificateImporter::IMPORT_OK,
- importer.ParseAndStoreCertificates(*certificates));
-
- OncNetworkParser parser(*network_configs,
- onc::ONC_SOURCE_USER_IMPORT);
- ASSERT_TRUE(parser.parse_error().empty());
- EXPECT_EQ(1, parser.GetNetworkConfigsSize());
- scoped_ptr<Network> network(parser.ParseNetwork(0, NULL));
- ASSERT_TRUE(network.get());
- EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type());
-
- StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate();
-
- network->SetEnrollmentDelegate(enrollment_delegate);
- EXPECT_FALSE(enrollment_delegate->did_enroll);
- EXPECT_FALSE(enrollment_delegate->correct_args);
- WifiNetwork* wifi1 = static_cast<WifiNetwork*>(network.get());
-
- ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi1);
- EXPECT_FALSE(wifi1->connected());
- EXPECT_TRUE(cros_->CanConnectToNetwork(wifi1));
- EXPECT_FALSE(wifi1->connected());
- wifi1->AttemptConnection(
- base::Bind(&WifiNetworkConnectCallback, cros_, wifi1));
- EXPECT_TRUE(wifi1->connected());
- EXPECT_TRUE(enrollment_delegate->did_enroll);
- EXPECT_TRUE(enrollment_delegate->correct_args);
-}
-
-TEST_F(NetworkLibraryStubTest, NetworkConnectOncVPN) {
- // Import a wireless network via loading an ONC file.
- scoped_ptr<base::ListValue> network_configs;
- scoped_ptr<base::ListValue> certificates;
- GetTestData("cert-pattern-vpn.onc", &certificates, &network_configs);
-
- onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT,
- false /* don't allow webtrust */);
- EXPECT_EQ(onc::CertificateImporter::IMPORT_OK,
- importer.ParseAndStoreCertificates(*certificates));
-
- OncNetworkParser parser(*network_configs,
- onc::ONC_SOURCE_USER_IMPORT);
- ASSERT_TRUE(parser.parse_error().empty());
- EXPECT_EQ(1, parser.GetNetworkConfigsSize());
- scoped_ptr<Network> network(parser.ParseNetwork(0, NULL));
- ASSERT_TRUE(network.get());
- EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type());
-
- StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate();
-
- network->SetEnrollmentDelegate(enrollment_delegate);
- EXPECT_FALSE(enrollment_delegate->did_enroll);
- EXPECT_FALSE(enrollment_delegate->correct_args);
- VirtualNetwork* vpn1 = static_cast<VirtualNetwork*>(network.get());
-
- ASSERT_NE(static_cast<const VirtualNetwork*>(NULL), vpn1);
- EXPECT_FALSE(vpn1->connected());
- EXPECT_TRUE(cros_->CanConnectToNetwork(vpn1));
- EXPECT_FALSE(vpn1->connected());
- vpn1->AttemptConnection(
- base::Bind(&VirtualNetworkConnectCallback, cros_, vpn1));
- EXPECT_TRUE(vpn1->connected());
- EXPECT_TRUE(enrollment_delegate->did_enroll);
- EXPECT_TRUE(enrollment_delegate->correct_args);
-}
+// TEST_F(NetworkLibraryStubTest, NetworkConnectOncWifi) {
+// // Import a wireless network via loading an ONC file.
+// scoped_ptr<base::ListValue> network_configs;
+// scoped_ptr<base::ListValue> certificates;
+
+// WifiNetwork* wifi = cros_->FindWifiNetworkByPath("wifi_cert_pattern");
+
+// onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT,
+// false /* don't allow webtrust */);
+// EXPECT_EQ(onc::CertificateImporter::IMPORT_OK,
+// importer.ParseAndStoreCertificates(*certificates));
+
+// OncNetworkParser parser(*network_configs,
+// onc::ONC_SOURCE_USER_IMPORT);
+// ASSERT_TRUE(parser.parse_error().empty());
+// EXPECT_EQ(1, parser.GetNetworkConfigsSize());
+// scoped_ptr<Network> network(parser.ParseNetwork(0, NULL));
+// ASSERT_TRUE(network.get());
+// EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type());
+
+// StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate();
+
+// network->SetEnrollmentDelegate(enrollment_delegate);
+// EXPECT_FALSE(enrollment_delegate->did_enroll);
+// EXPECT_FALSE(enrollment_delegate->correct_args);
+// WifiNetwork* wifi1 = static_cast<WifiNetwork*>(network.get());
+
+// ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi1);
+// EXPECT_FALSE(wifi1->connected());
+// EXPECT_TRUE(cros_->CanConnectToNetwork(wifi1));
+// EXPECT_FALSE(wifi1->connected());
+// wifi1->AttemptConnection(
+// base::Bind(&WifiNetworkConnectCallback, cros_, wifi1));
+// EXPECT_TRUE(wifi1->connected());
+// EXPECT_TRUE(enrollment_delegate->did_enroll);
+// EXPECT_TRUE(enrollment_delegate->correct_args);
+// }
+
+// TEST_F(NetworkLibraryStubTest, NetworkConnectOncVPN) {
+// // Import a wireless network via loading an ONC file.
+// scoped_ptr<base::ListValue> network_configs;
+// scoped_ptr<base::ListValue> certificates;
+// GetTestData("cert-pattern-vpn.onc", &certificates, &network_configs);
+
+// onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT,
+// false /* don't allow webtrust */);
+// EXPECT_EQ(onc::CertificateImporter::IMPORT_OK,
+// importer.ParseAndStoreCertificates(*certificates));
+
+// OncNetworkParser parser(*network_configs,
+// onc::ONC_SOURCE_USER_IMPORT);
+// ASSERT_TRUE(parser.parse_error().empty());
+// EXPECT_EQ(1, parser.GetNetworkConfigsSize());
+// scoped_ptr<Network> network(parser.ParseNetwork(0, NULL));
+// ASSERT_TRUE(network.get());
+// EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type());
+
+// StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate();
+
+// network->SetEnrollmentDelegate(enrollment_delegate);
+// EXPECT_FALSE(enrollment_delegate->did_enroll);
+// EXPECT_FALSE(enrollment_delegate->correct_args);
+// VirtualNetwork* vpn1 = static_cast<VirtualNetwork*>(network.get());
+
+// ASSERT_NE(static_cast<const VirtualNetwork*>(NULL), vpn1);
+// EXPECT_FALSE(vpn1->connected());
+// EXPECT_TRUE(cros_->CanConnectToNetwork(vpn1));
+// EXPECT_FALSE(vpn1->connected());
+// vpn1->AttemptConnection(
+// base::Bind(&VirtualNetworkConnectCallback, cros_, vpn1));
+// EXPECT_TRUE(vpn1->connected());
+// EXPECT_TRUE(enrollment_delegate->did_enroll);
+// EXPECT_TRUE(enrollment_delegate->correct_args);
+// }
stevenjb 2012/12/21 18:38:36 Remove?
Greg Spencer (Chromium) 2012/12/21 19:36:43 Yes, this should be removed. We don't check in co
pneubeck (no reviews) 2013/01/09 17:04:05 Done. Added new replacement tests.
TEST_F(NetworkLibraryStubTest, NetworkConnectVPN) {
VirtualNetwork* vpn1 = cros_->FindVirtualNetworkByPath("vpn1");

Powered by Google App Engine
This is Rietveld 408576698