Index: chrome/browser/chromeos/cros/network_library_unittest.cc |
diff --git a/chrome/browser/chromeos/cros/network_library_unittest.cc b/chrome/browser/chromeos/cros/network_library_unittest.cc |
index c5e8949acde9f06bef39751b94bcbfe3774a2fe7..8f270ac69adfef8b78af0289ed99769b2c008622 100644 |
--- a/chrome/browser/chromeos/cros/network_library_unittest.cc |
+++ b/chrome/browser/chromeos/cros/network_library_unittest.cc |
@@ -17,7 +17,6 @@ |
#include "base/path_service.h" |
#include "chrome/browser/chromeos/cros/cros_library.h" |
#include "chrome/browser/chromeos/cros/network_library.h" |
-#include "chrome/browser/chromeos/cros/onc_network_parser.h" |
#include "chrome/common/chrome_paths.h" |
#include "chromeos/network/onc/onc_certificate_importer.h" |
#include "chromeos/network/onc/onc_constants.h" |
@@ -296,79 +295,80 @@ TEST_F(NetworkLibraryStubTest, NetworkConnectWifi) { |
EXPECT_TRUE(wifi1->connected()); |
} |
-TEST_F(NetworkLibraryStubTest, NetworkConnectOncWifi) { |
- // Import a wireless network via loading an ONC file. |
- scoped_ptr<base::ListValue> network_configs; |
- scoped_ptr<base::ListValue> certificates; |
- GetTestData("cert-pattern.onc", &certificates, &network_configs); |
- |
- onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, |
- false /* don't allow webtrust */); |
- EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, |
- importer.ParseAndStoreCertificates(*certificates)); |
- |
- OncNetworkParser parser(*network_configs, |
- onc::ONC_SOURCE_USER_IMPORT); |
- ASSERT_TRUE(parser.parse_error().empty()); |
- EXPECT_EQ(1, parser.GetNetworkConfigsSize()); |
- scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); |
- ASSERT_TRUE(network.get()); |
- EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type()); |
- |
- StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); |
- |
- network->SetEnrollmentDelegate(enrollment_delegate); |
- EXPECT_FALSE(enrollment_delegate->did_enroll); |
- EXPECT_FALSE(enrollment_delegate->correct_args); |
- WifiNetwork* wifi1 = static_cast<WifiNetwork*>(network.get()); |
- |
- ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi1); |
- EXPECT_FALSE(wifi1->connected()); |
- EXPECT_TRUE(cros_->CanConnectToNetwork(wifi1)); |
- EXPECT_FALSE(wifi1->connected()); |
- wifi1->AttemptConnection( |
- base::Bind(&WifiNetworkConnectCallback, cros_, wifi1)); |
- EXPECT_TRUE(wifi1->connected()); |
- EXPECT_TRUE(enrollment_delegate->did_enroll); |
- EXPECT_TRUE(enrollment_delegate->correct_args); |
-} |
- |
-TEST_F(NetworkLibraryStubTest, NetworkConnectOncVPN) { |
- // Import a wireless network via loading an ONC file. |
- scoped_ptr<base::ListValue> network_configs; |
- scoped_ptr<base::ListValue> certificates; |
- GetTestData("cert-pattern-vpn.onc", &certificates, &network_configs); |
- |
- onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, |
- false /* don't allow webtrust */); |
- EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, |
- importer.ParseAndStoreCertificates(*certificates)); |
- |
- OncNetworkParser parser(*network_configs, |
- onc::ONC_SOURCE_USER_IMPORT); |
- ASSERT_TRUE(parser.parse_error().empty()); |
- EXPECT_EQ(1, parser.GetNetworkConfigsSize()); |
- scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); |
- ASSERT_TRUE(network.get()); |
- EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type()); |
- |
- StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); |
- |
- network->SetEnrollmentDelegate(enrollment_delegate); |
- EXPECT_FALSE(enrollment_delegate->did_enroll); |
- EXPECT_FALSE(enrollment_delegate->correct_args); |
- VirtualNetwork* vpn1 = static_cast<VirtualNetwork*>(network.get()); |
- |
- ASSERT_NE(static_cast<const VirtualNetwork*>(NULL), vpn1); |
- EXPECT_FALSE(vpn1->connected()); |
- EXPECT_TRUE(cros_->CanConnectToNetwork(vpn1)); |
- EXPECT_FALSE(vpn1->connected()); |
- vpn1->AttemptConnection( |
- base::Bind(&VirtualNetworkConnectCallback, cros_, vpn1)); |
- EXPECT_TRUE(vpn1->connected()); |
- EXPECT_TRUE(enrollment_delegate->did_enroll); |
- EXPECT_TRUE(enrollment_delegate->correct_args); |
-} |
+// TEST_F(NetworkLibraryStubTest, NetworkConnectOncWifi) { |
+// // Import a wireless network via loading an ONC file. |
+// scoped_ptr<base::ListValue> network_configs; |
+// scoped_ptr<base::ListValue> certificates; |
+ |
+// WifiNetwork* wifi = cros_->FindWifiNetworkByPath("wifi_cert_pattern"); |
+ |
+// onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, |
+// false /* don't allow webtrust */); |
+// EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, |
+// importer.ParseAndStoreCertificates(*certificates)); |
+ |
+// OncNetworkParser parser(*network_configs, |
+// onc::ONC_SOURCE_USER_IMPORT); |
+// ASSERT_TRUE(parser.parse_error().empty()); |
+// EXPECT_EQ(1, parser.GetNetworkConfigsSize()); |
+// scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); |
+// ASSERT_TRUE(network.get()); |
+// EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type()); |
+ |
+// StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); |
+ |
+// network->SetEnrollmentDelegate(enrollment_delegate); |
+// EXPECT_FALSE(enrollment_delegate->did_enroll); |
+// EXPECT_FALSE(enrollment_delegate->correct_args); |
+// WifiNetwork* wifi1 = static_cast<WifiNetwork*>(network.get()); |
+ |
+// ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi1); |
+// EXPECT_FALSE(wifi1->connected()); |
+// EXPECT_TRUE(cros_->CanConnectToNetwork(wifi1)); |
+// EXPECT_FALSE(wifi1->connected()); |
+// wifi1->AttemptConnection( |
+// base::Bind(&WifiNetworkConnectCallback, cros_, wifi1)); |
+// EXPECT_TRUE(wifi1->connected()); |
+// EXPECT_TRUE(enrollment_delegate->did_enroll); |
+// EXPECT_TRUE(enrollment_delegate->correct_args); |
+// } |
+ |
+// TEST_F(NetworkLibraryStubTest, NetworkConnectOncVPN) { |
+// // Import a wireless network via loading an ONC file. |
+// scoped_ptr<base::ListValue> network_configs; |
+// scoped_ptr<base::ListValue> certificates; |
+// GetTestData("cert-pattern-vpn.onc", &certificates, &network_configs); |
+ |
+// onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, |
+// false /* don't allow webtrust */); |
+// EXPECT_EQ(onc::CertificateImporter::IMPORT_OK, |
+// importer.ParseAndStoreCertificates(*certificates)); |
+ |
+// OncNetworkParser parser(*network_configs, |
+// onc::ONC_SOURCE_USER_IMPORT); |
+// ASSERT_TRUE(parser.parse_error().empty()); |
+// EXPECT_EQ(1, parser.GetNetworkConfigsSize()); |
+// scoped_ptr<Network> network(parser.ParseNetwork(0, NULL)); |
+// ASSERT_TRUE(network.get()); |
+// EXPECT_EQ(CLIENT_CERT_TYPE_PATTERN, network->client_cert_type()); |
+ |
+// StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); |
+ |
+// network->SetEnrollmentDelegate(enrollment_delegate); |
+// EXPECT_FALSE(enrollment_delegate->did_enroll); |
+// EXPECT_FALSE(enrollment_delegate->correct_args); |
+// VirtualNetwork* vpn1 = static_cast<VirtualNetwork*>(network.get()); |
+ |
+// ASSERT_NE(static_cast<const VirtualNetwork*>(NULL), vpn1); |
+// EXPECT_FALSE(vpn1->connected()); |
+// EXPECT_TRUE(cros_->CanConnectToNetwork(vpn1)); |
+// EXPECT_FALSE(vpn1->connected()); |
+// vpn1->AttemptConnection( |
+// base::Bind(&VirtualNetworkConnectCallback, cros_, vpn1)); |
+// EXPECT_TRUE(vpn1->connected()); |
+// EXPECT_TRUE(enrollment_delegate->did_enroll); |
+// EXPECT_TRUE(enrollment_delegate->correct_args); |
+// } |
stevenjb
2012/12/21 18:38:36
Remove?
Greg Spencer (Chromium)
2012/12/21 19:36:43
Yes, this should be removed. We don't check in co
pneubeck (no reviews)
2013/01/09 17:04:05
Done. Added new replacement tests.
|
TEST_F(NetworkLibraryStubTest, NetworkConnectVPN) { |
VirtualNetwork* vpn1 = cros_->FindVirtualNetworkByPath("vpn1"); |