Index: chrome/browser/signin/signin_manager_unittest.cc |
diff --git a/chrome/browser/signin/signin_manager_unittest.cc b/chrome/browser/signin/signin_manager_unittest.cc |
index 7eb1109bdc03baaab8f0bae381a301ef305dabb4..104053c38b555bf3d03ec97155fbb756575282c9 100644 |
--- a/chrome/browser/signin/signin_manager_unittest.cc |
+++ b/chrome/browser/signin/signin_manager_unittest.cc |
@@ -333,51 +333,6 @@ TEST_F(SigninManagerTest, SignInClientLogin) { |
EXPECT_EQ("user@gmail.com", manager_->GetAuthenticatedUsername()); |
} |
-TEST_F(SigninManagerTest, Prohibited) { |
- g_browser_process->local_state()->SetString( |
- prefs::kGoogleServicesUsernamePattern, ".*@google.com"); |
- manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->IsAllowedUsername("test@google.com")); |
- EXPECT_TRUE(manager_->IsAllowedUsername("happy@google.com")); |
- EXPECT_FALSE(manager_->IsAllowedUsername("test@invalid.com")); |
- EXPECT_FALSE(manager_->IsAllowedUsername("test@notgoogle.com")); |
- EXPECT_FALSE(manager_->IsAllowedUsername(std::string())); |
-} |
- |
-TEST_F(SigninManagerTest, TestAlternateWildcard) { |
- // Test to make sure we accept "*@google.com" as a pattern (treat it as if |
- // the admin entered ".*@google.com"). |
- g_browser_process->local_state()->SetString( |
- prefs::kGoogleServicesUsernamePattern, "*@google.com"); |
- manager_->Initialize(profile_.get()); |
- EXPECT_TRUE(manager_->IsAllowedUsername("test@google.com")); |
- EXPECT_TRUE(manager_->IsAllowedUsername("happy@google.com")); |
- EXPECT_FALSE(manager_->IsAllowedUsername("test@invalid.com")); |
- EXPECT_FALSE(manager_->IsAllowedUsername("test@notgoogle.com")); |
- EXPECT_FALSE(manager_->IsAllowedUsername(std::string())); |
-} |
- |
-TEST_F(SigninManagerTest, ProhibitedAtStartup) { |
- profile_->GetPrefs()->SetString(prefs::kGoogleServicesUsername, |
- "monkey@invalid.com"); |
- g_browser_process->local_state()->SetString( |
- prefs::kGoogleServicesUsernamePattern, ".*@google.com"); |
- manager_->Initialize(profile_.get()); |
- // Currently signed in user is prohibited by policy, so should be signed out. |
- EXPECT_EQ("", manager_->GetAuthenticatedUsername()); |
-} |
- |
-TEST_F(SigninManagerTest, ProhibitedAfterStartup) { |
- std::string user("monkey@invalid.com"); |
- profile_->GetPrefs()->SetString(prefs::kGoogleServicesUsername, user); |
- manager_->Initialize(profile_.get()); |
- EXPECT_EQ(user, manager_->GetAuthenticatedUsername()); |
- // Update the profile - user should be signed out. |
- g_browser_process->local_state()->SetString( |
- prefs::kGoogleServicesUsernamePattern, ".*@google.com"); |
- EXPECT_EQ("", manager_->GetAuthenticatedUsername()); |
-} |
- |
TEST_F(SigninManagerTest, SignInWithCredentials) { |
manager_->Initialize(profile_.get()); |
EXPECT_TRUE(manager_->GetAuthenticatedUsername().empty()); |