Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1139)

Side by Side Diff: chrome/browser/chromeos/login/saml/saml_browsertest.cc

Issue 1191273002: ChromeOS: Show the new POD RE-AUTH ICON when users needs to re-auth (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Update after review. Created 5 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <cstring> 5 #include <cstring>
6 #include <string> 6 #include <string>
7 7
8 #include "base/bind.h" 8 #include "base/bind.h"
9 #include "base/bind_helpers.h" 9 #include "base/bind_helpers.h"
10 #include "base/callback.h" 10 #include "base/callback.h"
(...skipping 1107 matching lines...) Expand 10 before | Expand all | Expand 10 after
1118 content::WindowedNotificationObserver( 1118 content::WindowedNotificationObserver(
1119 chrome::NOTIFICATION_SESSION_STARTED, 1119 chrome::NOTIFICATION_SESSION_STARTED,
1120 content::NotificationService::AllSources()).Wait(); 1120 content::NotificationService::AllSources()).Wait();
1121 } 1121 }
1122 1122
1123 // Verifies that the offline login time limit does not affect a user who 1123 // Verifies that the offline login time limit does not affect a user who
1124 // authenticated without SAML. 1124 // authenticated without SAML.
1125 IN_PROC_BROWSER_TEST_P(SAMLPolicyTest, NoSAML) { 1125 IN_PROC_BROWSER_TEST_P(SAMLPolicyTest, NoSAML) {
1126 login_screen_load_observer_->Wait(); 1126 login_screen_load_observer_->Wait();
1127 // Verify that offline login is allowed. 1127 // Verify that offline login is allowed.
1128 JsExpect("window.getComputedStyle(document.querySelector(" 1128 JsExpect(
1129 " '#pod-row .signin-button-container')).display == 'none'"); 1129 "window.getComputedStyle(document.querySelector("
1130 " '#pod-row .reauth-hint-container')).display == 'none'");
1130 } 1131 }
1131 1132
1132 IN_PROC_BROWSER_TEST_P(SAMLPolicyTest, PRE_SAMLNoLimit) { 1133 IN_PROC_BROWSER_TEST_P(SAMLPolicyTest, PRE_SAMLNoLimit) {
1133 // Remove the offline login time limit for SAML users. 1134 // Remove the offline login time limit for SAML users.
1134 SetSAMLOfflineSigninTimeLimitPolicy(-1); 1135 SetSAMLOfflineSigninTimeLimitPolicy(-1);
1135 1136
1136 LogInWithSAML(kFirstSAMLUserEmail, kTestAuthSIDCookie1, kTestAuthLSIDCookie1); 1137 LogInWithSAML(kFirstSAMLUserEmail, kTestAuthSIDCookie1, kTestAuthLSIDCookie1);
1137 } 1138 }
1138 1139
1139 // Verifies that when no offline login time limit is set, a user who 1140 // Verifies that when no offline login time limit is set, a user who
1140 // authenticated with SAML is allowed to log in offline. 1141 // authenticated with SAML is allowed to log in offline.
1141 IN_PROC_BROWSER_TEST_P(SAMLPolicyTest, SAMLNoLimit) { 1142 IN_PROC_BROWSER_TEST_P(SAMLPolicyTest, SAMLNoLimit) {
1142 login_screen_load_observer_->Wait(); 1143 login_screen_load_observer_->Wait();
1143 // Verify that offline login is allowed. 1144 // Verify that offline login is allowed.
1144 JsExpect("window.getComputedStyle(document.querySelector(" 1145 JsExpect(
1145 " '#pod-row .signin-button-container')).display == 'none'"); 1146 "window.getComputedStyle(document.querySelector("
1147 " '#pod-row .reauth-hint-container')).display == 'none'");
1146 } 1148 }
1147 1149
1148 IN_PROC_BROWSER_TEST_P(SAMLPolicyTest, PRE_SAMLZeroLimit) { 1150 IN_PROC_BROWSER_TEST_P(SAMLPolicyTest, PRE_SAMLZeroLimit) {
1149 // Set the offline login time limit for SAML users to zero. 1151 // Set the offline login time limit for SAML users to zero.
1150 SetSAMLOfflineSigninTimeLimitPolicy(0); 1152 SetSAMLOfflineSigninTimeLimitPolicy(0);
1151 1153
1152 LogInWithSAML(kFirstSAMLUserEmail, kTestAuthSIDCookie1, kTestAuthLSIDCookie1); 1154 LogInWithSAML(kFirstSAMLUserEmail, kTestAuthSIDCookie1, kTestAuthLSIDCookie1);
1153 } 1155 }
1154 1156
1155 // Verifies that when the offline login time limit is exceeded for a user who 1157 // Verifies that when the offline login time limit is exceeded for a user who
1156 // authenticated via SAML, that user is forced to log in online the next time. 1158 // authenticated via SAML, that user is forced to log in online the next time.
1157 IN_PROC_BROWSER_TEST_P(SAMLPolicyTest, SAMLZeroLimit) { 1159 IN_PROC_BROWSER_TEST_P(SAMLPolicyTest, SAMLZeroLimit) {
1158 login_screen_load_observer_->Wait(); 1160 login_screen_load_observer_->Wait();
1159 // Verify that offline login is not allowed. 1161 // Verify that offline login is not allowed.
1160 JsExpect("window.getComputedStyle(document.querySelector(" 1162 JsExpect(
1161 " '#pod-row .signin-button-container')).display != 'none'"); 1163 "window.getComputedStyle(document.querySelector("
1164 " '#pod-row .reauth-hint-container')).display != 'none'");
1162 } 1165 }
1163 1166
1164 IN_PROC_BROWSER_TEST_P(SAMLPolicyTest, PRE_PRE_TransferCookiesAffiliated) { 1167 IN_PROC_BROWSER_TEST_P(SAMLPolicyTest, PRE_PRE_TransferCookiesAffiliated) {
1165 fake_saml_idp()->SetCookieValue(kSAMLIdPCookieValue1); 1168 fake_saml_idp()->SetCookieValue(kSAMLIdPCookieValue1);
1166 LogInWithSAML(kFirstSAMLUserEmail, kTestAuthSIDCookie1, kTestAuthLSIDCookie1); 1169 LogInWithSAML(kFirstSAMLUserEmail, kTestAuthSIDCookie1, kTestAuthLSIDCookie1);
1167 1170
1168 GetCookies(); 1171 GetCookies();
1169 EXPECT_EQ(kTestAuthSIDCookie1, GetCookieValue(kGAIASIDCookieName)); 1172 EXPECT_EQ(kTestAuthSIDCookie1, GetCookieValue(kGAIASIDCookieName));
1170 EXPECT_EQ(kTestAuthLSIDCookie1, GetCookieValue(kGAIALSIDCookieName)); 1173 EXPECT_EQ(kTestAuthLSIDCookie1, GetCookieValue(kGAIALSIDCookieName));
1171 EXPECT_EQ(kSAMLIdPCookieValue1, GetCookieValue(kSAMLIdPCookieName)); 1174 EXPECT_EQ(kSAMLIdPCookieValue1, GetCookieValue(kSAMLIdPCookieName));
(...skipping 63 matching lines...) Expand 10 before | Expand all | Expand 10 after
1235 EXPECT_EQ(kTestAuthSIDCookie1, GetCookieValue(kGAIASIDCookieName)); 1238 EXPECT_EQ(kTestAuthSIDCookie1, GetCookieValue(kGAIASIDCookieName));
1236 EXPECT_EQ(kTestAuthLSIDCookie1, GetCookieValue(kGAIALSIDCookieName)); 1239 EXPECT_EQ(kTestAuthLSIDCookie1, GetCookieValue(kGAIALSIDCookieName));
1237 EXPECT_EQ(kSAMLIdPCookieValue1, GetCookieValue(kSAMLIdPCookieName)); 1240 EXPECT_EQ(kSAMLIdPCookieValue1, GetCookieValue(kSAMLIdPCookieName));
1238 } 1241 }
1239 1242
1240 INSTANTIATE_TEST_CASE_P(SamlSuite, 1243 INSTANTIATE_TEST_CASE_P(SamlSuite,
1241 SAMLPolicyTest, 1244 SAMLPolicyTest,
1242 testing::Bool()); 1245 testing::Bool());
1243 1246
1244 } // namespace chromeos 1247 } // namespace chromeos
OLDNEW
« no previous file with comments | « chrome/browser/chromeos/login/lock/screen_locker_tester.cc ('k') | chrome/browser/resources/chromeos/login/oobe_screen.css » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698